Freax 2 hours ago from Freax • Freax 2 hours ago from Freax • How to Authenticate a Non-Deterministic Computation: Shift-Hiding Functions, Compressed LWE Sampling, Broadcast Encryption, and Obfuscation eprint.iacr.org/2026/741 Detected languages Raw content Share via ...