↓ Skip to main content

Theory of Cryptography

Overview of attention for book
Cover of 'Theory of Cryptography'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency
  3. Altmetric Badge
    Chapter 2 On Seed-Incompressible Functions
  4. Altmetric Badge
    Chapter 3 Asymptotically Efficient Lattice-Based Digital Signatures
  5. Altmetric Badge
    Chapter 4 Basing Weak Public-Key Cryptography on Strong One-Way Functions
  6. Altmetric Badge
    Chapter 5 Which Languages Have 4-Round Zero-Knowledge Proofs?
  7. Altmetric Badge
    Chapter 6 How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge
  8. Altmetric Badge
    Chapter 7 General Properties of Quantum Zero-Knowledge Proofs
  9. Altmetric Badge
    Chapter 8 The Layered Games Framework for Specifications and Analysis of Security Protocols
  10. Altmetric Badge
    Chapter 9 Universally Composable Multi-party Computation with an Unreliable Common Reference String
  11. Altmetric Badge
    Chapter 10 Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
  12. Altmetric Badge
    Chapter 11 Fast Private Norm Estimation and Heavy Hitters
  13. Altmetric Badge
    Chapter 12 Matroids Can Be Far from Ideal Secret Sharing
  14. Altmetric Badge
    Chapter 13 Perfectly-Secure MPC with Linear Communication Complexity
  15. Altmetric Badge
    Chapter 14 MPC vs. SFE: Perfect Security in a Unified Corruption Model
  16. Altmetric Badge
    Chapter 15 Bridging Game Theory and Cryptography: Recent Results and Future Directions
  17. Altmetric Badge
    Chapter 16 Verifiably Secure Devices
  18. Altmetric Badge
    Chapter 17 Lower Bounds on Implementing Robust and Resilient Mediators
  19. Altmetric Badge
    Chapter 18 Cryptography and Game Theory: Designing Protocols for Exchanging Information
  20. Altmetric Badge
    Chapter 19 Equivocal Blind Signatures and Adaptive UC-Security
  21. Altmetric Badge
    Chapter 20 P-signatures and Noninteractive Anonymous Credentials
  22. Altmetric Badge
    Chapter 21 Multi-property Preserving Combiners for Hash Functions
  23. Altmetric Badge
    Chapter 22 OT-Combiners via Secure Computation
  24. Altmetric Badge
    Chapter 23 Semi-honest to Malicious Oblivious Transfer—The Black-Box Way
  25. Altmetric Badge
    Chapter 24 Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
  26. Altmetric Badge
    Chapter 25 A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
  27. Altmetric Badge
    Chapter 26 Randomness Extraction Via δ -Biased Masking in the Presence of a Quantum Attacker
  28. Altmetric Badge
    Chapter 27 An Equivalence Between Zero Knowledge and Commitments
  29. Altmetric Badge
    Chapter 28 Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model
  30. Altmetric Badge
    Chapter 29 The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization
  31. Altmetric Badge
    Chapter 30 On Constant-Round Concurrent Zero-Knowledge
  32. Altmetric Badge
    Chapter 31 Concurrent Non-malleable Commitments from Any One-Way Function
  33. Altmetric Badge
    Chapter 32 Faster and Shorter Password-Authenticated Key Exchange
  34. Altmetric Badge
    Chapter 33 Saving Private Randomness in One-Way Functions and Pseudorandom Generators
  35. Altmetric Badge
    Chapter 34 Degradation and Amplification of Computational Hardness
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
2 X users
patent
3 patents
wikipedia
1 Wikipedia page
q&a
1 Q&A thread

Citations

dimensions_citation
10 Dimensions

Readers on

mendeley
1 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Theory of Cryptography
Published by
Springer Berlin Heidelberg, February 2008
DOI 10.1007/978-3-540-78524-8
ISBNs
978-3-54-078523-1, 978-3-54-078524-8
Editors

Canetti, Ran

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 1 Mendeley reader of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 1 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 100%
Readers by discipline Count As %
Computer Science 1 100%