↓ Skip to main content

Advances in Cryptology – CRYPTO 2012

Overview of attention for book
Cover of 'Advances in Cryptology – CRYPTO 2012'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 An Enciphering Scheme Based on a Card Shuffle
  3. Altmetric Badge
    Chapter 2 Tweakable Blockciphers with Beyond Birthday-Bound Security
  4. Altmetric Badge
    Chapter 3 Breaking and Repairing GCM Security Proofs
  5. Altmetric Badge
    Chapter 4 On the Distribution of Linear Biases: Three Instructive Examples
  6. Altmetric Badge
    Chapter 5 Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs
  7. Altmetric Badge
    Chapter 6 The End of Crypto
  8. Altmetric Badge
    Chapter 7 Must You Know the Code of f to Securely Compute f ?
  9. Altmetric Badge
    Chapter 8 Adaptively Secure Multi-Party Computation with Dishonest Majority
  10. Altmetric Badge
    Chapter 9 Collusion-Preserving Computation
  11. Altmetric Badge
    Chapter 10 Secret Sharing Schemes for Very Dense Graphs
  12. Altmetric Badge
    Chapter 11 Functional Encryption with Bounded Collusions via Multi-party Computation
  13. Altmetric Badge
    Chapter 12 New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
  14. Altmetric Badge
    Chapter 13 Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
  15. Altmetric Badge
    Chapter 14 Functional Encryption for Regular Languages
  16. Altmetric Badge
    Chapter 15 Secure Database Commitments and Universal Arguments of Quasi Knowledge
  17. Altmetric Badge
    Chapter 16 Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits
  18. Altmetric Badge
    Chapter 17 On the Security of TLS-DHE in the Standard Model
  19. Altmetric Badge
    Chapter 18 Semantic Security for the Wiretap Channel
  20. Altmetric Badge
    Chapter 19 Multi-instance Security and Its Application to Password-Based Cryptography
  21. Altmetric Badge
    Chapter 20 Hash Functions Based on Three Permutations: A Generic Security Analysis
  22. Altmetric Badge
    Chapter 21 To Hash or Not to Hash Again? (In)Differentiability Results for $$H^2$$ and HMAC
  23. Altmetric Badge
    Chapter 22 New Preimage Attacks against Reduced SHA-1
  24. Altmetric Badge
    Chapter 23 Stam’s Conjecture and Threshold Phenomena in Collision Resistance
  25. Altmetric Badge
    Chapter 24 Universal Composability from Essentially Any Trusted Setup
  26. Altmetric Badge
    Chapter 25 Impossibility Results for Static Input Secure Computation
  27. Altmetric Badge
    Chapter 26 New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation
  28. Altmetric Badge
    Chapter 27 Black-Box Constructions of Composable Protocols without Set-Up
  29. Altmetric Badge
    Chapter 28 Crowd-Blending Privacy
  30. Altmetric Badge
    Chapter 29 Differential Privacy with Imperfect Randomness
  31. Altmetric Badge
    Chapter 30 Tamper and Leakage Resilience in the Split-State Model
  32. Altmetric Badge
    Chapter 31 Securing Circuits against Constant-Rate Tampering
  33. Altmetric Badge
    Chapter 32 How to Compute under $${\mathcal {\varvec{AC}}}^\mathbf{0}$$ Leakage without Secure Hardware
  34. Altmetric Badge
    Chapter 33 Recent Advances and Existing Research Questions in Platform Security
  35. Altmetric Badge
    Chapter 34 Group Signatures with Almost-for-Free Revocation
  36. Altmetric Badge
    Chapter 35 Tightly Secure Signatures and Public-Key Encryption
  37. Altmetric Badge
    Chapter 36 Efficient Padding Oracle Attacks on Cryptographic Hardware
  38. Altmetric Badge
    Chapter 37 Public Keys
  39. Altmetric Badge
    Chapter 38 Multiparty Computation from Somewhat Homomorphic Encryption
  40. Altmetric Badge
    Chapter 39 Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
  41. Altmetric Badge
    Chapter 40 A New Approach to Practical Active-Secure Two-Party Computation
  42. Altmetric Badge
    Chapter 41 The Curious Case of Non-Interactive Commitments – On the Power of Black-Box vs. Non-Black-Box Use of Primitives
  43. Altmetric Badge
    Chapter 42 Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
  44. Altmetric Badge
    Chapter 43 Resistance against Iterated Attacks by Decorrelation Revisited
  45. Altmetric Badge
    Chapter 44 Secure Identity-Based Encryption in the Quantum Random Oracle Model
  46. Altmetric Badge
    Chapter 45 Quantum to Classical Randomness Extractors
  47. Altmetric Badge
    Chapter 46 Actively Secure Two-Party Evaluation of Any Quantum Operation
  48. Altmetric Badge
    Chapter 47 On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
  49. Altmetric Badge
    Chapter 48 Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves
  50. Altmetric Badge
    Chapter 49 Homomorphic Evaluation of the AES Circuit
  51. Altmetric Badge
    Chapter 50 Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

news
1 news outlet
twitter
9 X users
patent
9 patents
wikipedia
9 Wikipedia pages

Citations

dimensions_citation
28 Dimensions

Readers on

mendeley
19 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Advances in Cryptology – CRYPTO 2012
Published by
Advances in Cryptology Crypto 2012, January 2012
DOI 10.1007/978-3-642-32009-5
ISBNs
978-3-64-232008-8, 978-3-64-232009-5
Editors

Safavi-Naini, Reihaneh, Canetti, Ran, Safavi-Naini, Reihaneh, Canetti, Ran

X Demographics

X Demographics

The data shown below were collected from the profiles of 9 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 19 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 19 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 5%
Student > Doctoral Student 1 5%
Unknown 17 89%
Readers by discipline Count As %
Computer Science 2 11%
Unknown 17 89%