↓ Skip to main content

Theory of Cryptography

Overview of attention for book
Cover of 'Theory of Cryptography'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Optimal Error Correction Against Computationally Bounded Noise
  3. Altmetric Badge
    Chapter 2 Hardness Amplification of Weakly Verifiable Puzzles
  4. Altmetric Badge
    Chapter 3 On Hardness Amplification of One-Way Functions
  5. Altmetric Badge
    Chapter 4 Cryptography in Subgroups of $\mathbb{Z}_{n}^{*}$
  6. Altmetric Badge
    Chapter 5 Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs
  7. Altmetric Badge
    Chapter 6 Comparing Two Notions of Simulatability
  8. Altmetric Badge
    Chapter 7 Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
  9. Altmetric Badge
    Chapter 8 Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
  10. Altmetric Badge
    Chapter 9 Adaptively-Secure, Non-interactive Public-Key Encryption
  11. Altmetric Badge
    Chapter 10 Adaptive Security of Symbolic Encryption
  12. Altmetric Badge
    Chapter 11 Chosen-Ciphertext Security of Multiple Encryption
  13. Altmetric Badge
    Chapter 12 Public-Key Steganography with Active Attacks
  14. Altmetric Badge
    Chapter 13 Upper and Lower Bounds on Black-Box Steganography
  15. Altmetric Badge
    Chapter 14 Fair-Zero Knowledge
  16. Altmetric Badge
    Chapter 15 How to Securely Outsource Cryptographic Computations
  17. Altmetric Badge
    Chapter 16 Secure Computation of the Mean and Related Statistics
  18. Altmetric Badge
    Chapter 17 Keyword Search and Oblivious Pseudorandom Functions
  19. Altmetric Badge
    Chapter 18 Evaluating 2-DNF Formulas on Ciphertexts
  20. Altmetric Badge
    Chapter 19 Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation
  21. Altmetric Badge
    Chapter 20 Toward Privacy in Public Databases
  22. Altmetric Badge
    Chapter 21 The Universal Composable Security of Quantum Key Distribution
  23. Altmetric Badge
    Chapter 22 Universally Composable Privacy Amplification Against Quantum Adversaries
  24. Altmetric Badge
    Chapter 23 A Universally Composable Secure Channel Based on the KEM-DEM Framework
  25. Altmetric Badge
    Chapter 24 Sufficient Conditions for Collision-Resistant Hashing
  26. Altmetric Badge
    Chapter 25 The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
  27. Altmetric Badge
    Chapter 26 On the Relationships Between Notions of Simulation-Based Security
  28. Altmetric Badge
    Chapter 27 A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes
  29. Altmetric Badge
    Chapter 28 Further Simplifications in Proactive RSA Signatures
  30. Altmetric Badge
    Chapter 29 Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem
  31. Altmetric Badge
    Chapter 30 Entropic Security and the Encryption of High Entropy Messages
  32. Altmetric Badge
    Chapter 31 Error Correction in the Bounded Storage Model
  33. Altmetric Badge
    Chapter 32 Characterizing Ideal Weighted Threshold Secret Sharing
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

blogs
2 blogs
twitter
2 X users
patent
3 patents
wikipedia
2 Wikipedia pages
q&a
1 Q&A thread

Citations

dimensions_citation
17 Dimensions

Readers on

mendeley
32 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Theory of Cryptography
Published by
Springer, Berlin, Heidelberg, January 2005
DOI 10.1007/b106171
ISBNs
978-3-54-024573-5, 978-3-54-030576-7
Editors

Joe Kilian

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 32 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 32 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 3%
Unknown 31 97%
Readers by discipline Count As %
Computer Science 1 3%
Unknown 31 97%