↓ Skip to main content

Theory of Cryptography

Overview of attention for book
Cover of 'Theory of Cryptography'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 From Indifferentiability to Constructive Cryptography (and Back)
  3. Altmetric Badge
    Chapter 2 Fast Pseudorandom Functions Based on Expander Graphs
  4. Altmetric Badge
    Chapter 3 3-Message Zero Knowledge Against Human Ignorance
  5. Altmetric Badge
    Chapter 4 The GGM Function Family Is a Weakly One-Way Family of Functions
  6. Altmetric Badge
    Chapter 5 On the (In)Security of SNARKs in the Presence of Oracles
  7. Altmetric Badge
    Chapter 6 Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
  8. Altmetric Badge
    Chapter 7 Simulating Auxiliary Inputs, Revisited
  9. Altmetric Badge
    Chapter 8 Pseudoentropy: Lower-Bounds for Chain Rules and Transformations
  10. Altmetric Badge
    Chapter 9 Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key Agreement
  11. Altmetric Badge
    Chapter 10 Simultaneous Secrecy and Reliability Amplification for a General Channel Model
  12. Altmetric Badge
    Chapter 11 Proof of Space from Stacked Expanders
  13. Altmetric Badge
    Chapter 12 Perfectly Secure Message Transmission in Two Rounds
  14. Altmetric Badge
    Chapter 13 Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
  15. Altmetric Badge
    Chapter 14 Binary AMD Circuits from Secure Multiparty Computation
  16. Altmetric Badge
    Chapter 15 Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
  17. Altmetric Badge
    Chapter 16 Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions
  18. Altmetric Badge
    Chapter 17 Adaptive Security of Yao’s Garbled Circuits
  19. Altmetric Badge
    Chapter 18 Efficient Secure Multiparty Computation with Identifiable Abort
  20. Altmetric Badge
    Chapter 19 Secure Multiparty RAM Computation in Constant Rounds
  21. Altmetric Badge
    Chapter 20 Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
  22. Altmetric Badge
    Chapter 21 More Efficient Constant-Round Multi-party Computation from BMR and SHE
  23. Altmetric Badge
    Chapter 22 Cross and Clean: Amortized Garbled Circuits with Constant Overhead
  24. Altmetric Badge
    Chapter 23 Separating Computational and Statistical Differential Privacy in the Client-Server Model
  25. Altmetric Badge
    Chapter 24 Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
  26. Altmetric Badge
    Chapter 25 Strong Hardness of Privacy from Weak Traitor Tracing
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
2 patents

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Theory of Cryptography
Published by
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I, October 2016
DOI 10.1007/978-3-662-53641-4
ISBNs
978-3-66-253640-7, 978-3-66-253641-4
Authors

Hirt, Martin, Smith, Adam

Editors

Hirt, Martin, Smith, Adam

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 25%
Professor > Associate Professor 1 25%
Researcher 1 25%
Other 1 25%
Readers by discipline Count As %
Engineering 2 50%
Computer Science 1 25%
Unknown 1 25%