↓ Skip to main content

Theory of Cryptography

Overview of attention for book
Cover of 'Theory of Cryptography'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Barriers to Black-Box Constructions of Traitor Tracing Systems
  3. Altmetric Badge
    Chapter 2 On the Impossibility of Entropy Reversal, and Its Application to Zero-Knowledge Proofs
  4. Altmetric Badge
    Chapter 3 Position-Based Cryptography and Multiparty Communication Complexity
  5. Altmetric Badge
    Chapter 4 When Does Functional Encryption Imply Obfuscation?
  6. Altmetric Badge
    Chapter 5 Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation
  7. Altmetric Badge
    Chapter 6 Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness
  8. Altmetric Badge
    Chapter 7 Functional Encryption for Bounded Collusions, Revisited
  9. Altmetric Badge
    Chapter 8 Attribute-Hiding Predicate Encryption in Bilinear Groups, Revisited
  10. Altmetric Badge
    Chapter 9 Constrained Keys for Invertible Pseudorandom Functions
  11. Altmetric Badge
    Chapter 10 Private Constrained PRFs (and More) from LWE
  12. Altmetric Badge
    Chapter 11 The Edited Truth
  13. Altmetric Badge
    Chapter 12 A Modular Analysis of the Fujisaki-Okamoto Transformation
  14. Altmetric Badge
    Chapter 13 From Selective IBE to Full IBE and Selective HIBE
  15. Altmetric Badge
    Chapter 14 Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy
  16. Altmetric Badge
    Chapter 15 On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i
  17. Altmetric Badge
    Chapter 16 Bandwidth Hard Functions for ASIC Resistance
  18. Altmetric Badge
    Chapter 17 Moderately Hard Functions: Definition, Instantiations, and Applications
  19. Altmetric Badge
    Chapter 18 Overcoming Cryptographic Impossibility Results Using Blockchains
  20. Altmetric Badge
    Chapter 19 Secure Two-Party Computation with Fairness - A Necessary Design Principle
  21. Altmetric Badge
    Chapter 20 Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions
  22. Altmetric Badge
    Chapter 21 On Secure Two-Party Computation in Three Rounds
  23. Altmetric Badge
    Chapter 22 Four Round Secure Computation Without Setup
  24. Altmetric Badge
    Chapter 23 Round-Optimal Secure Two-Party Computation from Trapdoor Permutations
  25. Altmetric Badge
    Chapter 24 Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds
  26. Altmetric Badge
    Chapter 25 Round Optimal Concurrent MPC via Strong Simulation
  27. Altmetric Badge
    Chapter 26 A Unified Approach to Constructing Black-Box UC Protocols in Trusted Setup Models
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
1 patent

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
5 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Theory of Cryptography
Published by
Springer International Publishing, November 2017
DOI 10.1007/978-3-319-70500-2
ISBNs
978-3-31-970499-9, 978-3-31-970500-2
Editors

Kalai, Yael, Reyzin, Leonid

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 5 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 5 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 20%
Researcher 1 20%
Student > Postgraduate 1 20%
Student > Master 1 20%
Unknown 1 20%
Readers by discipline Count As %
Computer Science 2 40%
Design 1 20%
Unknown 2 40%