↓ Skip to main content

Theory of Cryptography

Overview of attention for book
Cover of 'Theory of Cryptography'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Does Privacy Require True Randomness?
  3. Altmetric Badge
    Chapter 2 Tackling Adaptive Corruptions in Multicast Encryption Protocols
  4. Altmetric Badge
    Chapter 3 Long-Term Security and Universal Composability
  5. Altmetric Badge
    Chapter 4 Universally Composable Security with Global Setup
  6. Altmetric Badge
    Chapter 5 Parallel Repetition of Computationally Sound Protocols Revisited
  7. Altmetric Badge
    Chapter 6 Lower Bounds for Non-interactive Zero-Knowledge
  8. Altmetric Badge
    Chapter 7 Perfect NIZK with Adaptive Soundness
  9. Altmetric Badge
    Chapter 8 Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
  10. Altmetric Badge
    Chapter 9 On the Necessity of Rewinding in Secure Multiparty Computation
  11. Altmetric Badge
    Chapter 10 On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits
  12. Altmetric Badge
    Chapter 11 On Best-Possible Obfuscation
  13. Altmetric Badge
    Chapter 12 Obfuscation for Cryptographic Purposes
  14. Altmetric Badge
    Chapter 13 Securely Obfuscating Re-encryption
  15. Altmetric Badge
    Chapter 14 Weakly-Private Secret Sharing Schemes
  16. Altmetric Badge
    Chapter 15 On Secret Sharing Schemes, Matroids and Polymatroids
  17. Altmetric Badge
    Chapter 16 Secure Linear Algebra Using Linearly Recurrent Sequences
  18. Altmetric Badge
    Chapter 17 Towards Optimal and Efficient Perfectly Secure Message Transmission
  19. Altmetric Badge
    Chapter 18 Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
  20. Altmetric Badge
    Chapter 19 Designated Confirmer Signatures Revisited
  21. Altmetric Badge
    Chapter 20 From Weak to Strong Watermarking
  22. Altmetric Badge
    Chapter 21 Private Approximation of Clustering and Vertex Cover
  23. Altmetric Badge
    Chapter 22 Robuster Combiners for Oblivious Transfer
  24. Altmetric Badge
    Chapter 23 One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
  25. Altmetric Badge
    Chapter 24 Towards a Separation of Semantic and CCA Security for Public Key Encryption
  26. Altmetric Badge
    Chapter 25 Unifying Classical and Quantum Key Distillation
  27. Altmetric Badge
    Chapter 26 Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
  28. Altmetric Badge
    Chapter 27 (Password) Authenticated Key Establishment: From 2-Party to Group
  29. Altmetric Badge
    Chapter 28 Multi-authority Attribute Based Encryption
  30. Altmetric Badge
    Chapter 29 Conjunctive, Subset, and Range Queries on Encrypted Data
  31. Altmetric Badge
    Chapter 30 How to Shuffle in Public
  32. Altmetric Badge
    Chapter 31 Evaluating Branching Programs on Encrypted Data
Attention for Chapter 8: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Altmetric Badge

Mentioned by

wikipedia
1 Wikipedia page

Readers on

mendeley
17 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Chapter number 8
Book title
Theory of Cryptography
Published by
Springer, Berlin, Heidelberg, February 2007
DOI 10.1007/978-3-540-70936-7_8
Book ISBNs
978-3-54-070935-0, 978-3-54-070936-7
Authors

Yonatan Aumann, Yehuda Lindell, Aumann, Yonatan, Lindell, Yehuda

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 17 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 17 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 41%
Student > Master 3 18%
Student > Postgraduate 2 12%
Student > Doctoral Student 1 6%
Other 1 6%
Other 2 12%
Unknown 1 6%
Readers by discipline Count As %
Computer Science 11 65%
Mathematics 1 6%
Physics and Astronomy 1 6%
Engineering 1 6%
Design 1 6%
Other 0 0%
Unknown 2 12%