↓ Skip to main content

Theory of Cryptography

Overview of attention for book
Cover of 'Theory of Cryptography'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Optimal Error Correction Against Computationally Bounded Noise
  3. Altmetric Badge
    Chapter 2 Hardness Amplification of Weakly Verifiable Puzzles
  4. Altmetric Badge
    Chapter 3 On Hardness Amplification of One-Way Functions
  5. Altmetric Badge
    Chapter 4 Cryptography in Subgroups of $\mathbb{Z}_{n}^{*}$
  6. Altmetric Badge
    Chapter 5 Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs
  7. Altmetric Badge
    Chapter 6 Comparing Two Notions of Simulatability
  8. Altmetric Badge
    Chapter 7 Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
  9. Altmetric Badge
    Chapter 8 Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
  10. Altmetric Badge
    Chapter 9 Adaptively-Secure, Non-interactive Public-Key Encryption
  11. Altmetric Badge
    Chapter 10 Adaptive Security of Symbolic Encryption
  12. Altmetric Badge
    Chapter 11 Chosen-Ciphertext Security of Multiple Encryption
  13. Altmetric Badge
    Chapter 12 Public-Key Steganography with Active Attacks
  14. Altmetric Badge
    Chapter 13 Upper and Lower Bounds on Black-Box Steganography
  15. Altmetric Badge
    Chapter 14 Fair-Zero Knowledge
  16. Altmetric Badge
    Chapter 15 How to Securely Outsource Cryptographic Computations
  17. Altmetric Badge
    Chapter 16 Secure Computation of the Mean and Related Statistics
  18. Altmetric Badge
    Chapter 17 Keyword Search and Oblivious Pseudorandom Functions
  19. Altmetric Badge
    Chapter 18 Evaluating 2-DNF Formulas on Ciphertexts
  20. Altmetric Badge
    Chapter 19 Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation
  21. Altmetric Badge
    Chapter 20 Toward Privacy in Public Databases
  22. Altmetric Badge
    Chapter 21 The Universal Composable Security of Quantum Key Distribution
  23. Altmetric Badge
    Chapter 22 Universally Composable Privacy Amplification Against Quantum Adversaries
  24. Altmetric Badge
    Chapter 23 A Universally Composable Secure Channel Based on the KEM-DEM Framework
  25. Altmetric Badge
    Chapter 24 Sufficient Conditions for Collision-Resistant Hashing
  26. Altmetric Badge
    Chapter 25 The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
  27. Altmetric Badge
    Chapter 26 On the Relationships Between Notions of Simulation-Based Security
  28. Altmetric Badge
    Chapter 27 A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes
  29. Altmetric Badge
    Chapter 28 Further Simplifications in Proactive RSA Signatures
  30. Altmetric Badge
    Chapter 29 Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem
  31. Altmetric Badge
    Chapter 30 Entropic Security and the Encryption of High Entropy Messages
  32. Altmetric Badge
    Chapter 31 Error Correction in the Bounded Storage Model
  33. Altmetric Badge
    Chapter 32 Characterizing Ideal Weighted Threshold Secret Sharing
Attention for Chapter 19: Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation
Altmetric Badge

Mentioned by

patent
2 patents

Citations

dimensions_citation
17 Dimensions

Readers on

mendeley
63 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation
Chapter number 19
Book title
Theory of Cryptography
Published by
Springer, Berlin, Heidelberg, February 2005
DOI 10.1007/978-3-540-30576-7_19
Book ISBNs
978-3-54-024573-5, 978-3-54-030576-7
Authors

Ronald Cramer, Ivan Damgård, Yuval Ishai, Cramer, Ronald, Damgård, Ivan, Ishai, Yuval

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 63 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 1 2%
United States 1 2%
France 1 2%
Unknown 60 95%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 17 27%
Student > Master 13 21%
Researcher 8 13%
Student > Doctoral Student 5 8%
Other 3 5%
Other 11 17%
Unknown 6 10%
Readers by discipline Count As %
Computer Science 45 71%
Mathematics 4 6%
Engineering 4 6%
Physics and Astronomy 2 3%
Design 1 2%
Other 0 0%
Unknown 7 11%