↓ Skip to main content

Theory of Cryptography

Overview of attention for book
Cover of 'Theory of Cryptography'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 An Optimally Fair Coin Toss
  3. Altmetric Badge
    Chapter 2 Complete Fairness in Multi-party Computation without an Honest Majority
  4. Altmetric Badge
    Chapter 3 Fairness with an Honest Minority and a Rational Majority
  5. Altmetric Badge
    Chapter 4 Purely Rational Secret Sharing (Extended Abstract)
  6. Altmetric Badge
    Chapter 5 Some Recent Progress in Lattice-Based Cryptography
  7. Altmetric Badge
    Chapter 6 Non-malleable Obfuscation
  8. Altmetric Badge
    Chapter 7 Simulation-Based Concurrent Non-malleable Commitments and Decommitments
  9. Altmetric Badge
    Chapter 8 Proofs of Retrievability via Hardness Amplification
  10. Altmetric Badge
    Chapter 9 Security Amplification for Interactive Cryptographic Primitives
  11. Altmetric Badge
    Chapter 10 Composability and On-Line Deniability of Authentication
  12. Altmetric Badge
    Chapter 11 Authenticated Adversarial Routing
  13. Altmetric Badge
    Chapter 12 Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
  14. Altmetric Badge
    Chapter 13 On the (Im)Possibility of Key Dependent Encryption
  15. Altmetric Badge
    Chapter 14 On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols
  16. Altmetric Badge
    Chapter 15 Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
  17. Altmetric Badge
    Chapter 16 Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
  18. Altmetric Badge
    Chapter 17 Realistic Failures in Secure Multi-party Computation
  19. Altmetric Badge
    Chapter 18 Secure Arithmetic Computation with No Honest Majority
  20. Altmetric Badge
    Chapter 19 Universally Composable Multiparty Computation with Partially Isolated Parties
  21. Altmetric Badge
    Chapter 20 Oblivious Transfer from Weak Noisy Channels
  22. Altmetric Badge
    Chapter 21 Composing Quantum Protocols in a Classical Environment
  23. Altmetric Badge
    Chapter 22 LEGO for Two-Party Secure Computation
  24. Altmetric Badge
    Chapter 23 Simple, Black-Box Constructions of Adaptively Secure Protocols
  25. Altmetric Badge
    Chapter 24 Black-Box Constructions of Two-Party Protocols from One-Way Functions
  26. Altmetric Badge
    Chapter 25 Chosen-Ciphertext Security via Correlated Products
  27. Altmetric Badge
    Chapter 26 Hierarchical Identity Based Encryption with Polynomially Many Levels
  28. Altmetric Badge
    Chapter 27 Predicate Privacy in Encryption Systems
  29. Altmetric Badge
    Chapter 28 Simultaneous Hardcore Bits and Cryptography against Memory Attacks
  30. Altmetric Badge
    Chapter 29 The Differential Privacy Frontier (Extended Abstract)
  31. Altmetric Badge
    Chapter 30 How Efficient Can Memory Checking Be?
  32. Altmetric Badge
    Chapter 31 Goldreich’s One-Way Function Candidate and Myopic Backtracking Algorithms
  33. Altmetric Badge
    Chapter 32 Secret Sharing and Non-Shannon Information Inequalities
  34. Altmetric Badge
    Chapter 33 Weak Verifiable Random Functions
  35. Altmetric Badge
    Chapter 34 Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
  36. Altmetric Badge
    Chapter 35 Towards a Theory of Extractable Functions
  37. Altmetric Badge
    Chapter 36 Erratum to: Theory of Cryptography
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • Good Attention Score compared to outputs of the same age (78th percentile)
  • Good Attention Score compared to outputs of the same age and source (77th percentile)

Mentioned by

patent
1 patent
wikipedia
3 Wikipedia pages

Citations

dimensions_citation
11 Dimensions

Readers on

mendeley
17 Mendeley