↓ Skip to main content

Theory of Cryptography

Overview of attention for book
Cover of 'Theory of Cryptography'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Algebraically Structured LWE, Revisited
  3. Altmetric Badge
    Chapter 2 Lattice Trapdoors and IBE from Middle-Product LWE
  4. Altmetric Badge
    Chapter 3 Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation
  5. Altmetric Badge
    Chapter 4 Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
  6. Altmetric Badge
    Chapter 5 A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement
  7. Altmetric Badge
    Chapter 6 Synchronous Consensus with Optimal Asynchronous Fallback Guarantees
  8. Altmetric Badge
    Chapter 7 Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
  9. Altmetric Badge
    Chapter 8 Optimal Bounded-Collusion Secure Functional Encryption
  10. Altmetric Badge
    Chapter 9 From FE Combiners to Secure MPC and Back
  11. Altmetric Badge
    Chapter 10 (Pseudo) Random Quantum States with Binary Phase
  12. Altmetric Badge
    Chapter 11 General Linear Group Action on Tensors: A Candidate for Post-quantum Cryptography
  13. Altmetric Badge
    Chapter 12 Composable and Finite Computational Security of Quantum Message Transmission
  14. Altmetric Badge
    Chapter 13 On Fully Secure MPC with Solitary Output
  15. Altmetric Badge
    Chapter 14 Secure Computation with Preprocessing via Function Secret Sharing
  16. Altmetric Badge
    Chapter 15 Efficient Private PEZ Protocols for Symmetric Functions
  17. Altmetric Badge
    Chapter 16 The Function-Inversion Problem: Barriers and Opportunities
  18. Altmetric Badge
    Chapter 17 On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations
  19. Altmetric Badge
    Chapter 18 Characterizing Collision and Second-Preimage Resistance in Linicrypt
  20. Altmetric Badge
    Chapter 19 Efficient Information-Theoretic Secure Multiparty Computation over $$\mathbb {Z}/p^k\mathbb {Z}$$ via Galois Rings
  21. Altmetric Badge
    Chapter 20 Is Information-Theoretic Topology-Hiding Computation Possible?
  22. Altmetric Badge
    Chapter 21 Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
  23. Altmetric Badge
    Chapter 22 On Perfectly Secure 2PC in the OT-Hybrid Model
Attention for Chapter 1: Algebraically Structured LWE, Revisited
Altmetric Badge

Mentioned by

wikipedia
2 Wikipedia pages

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
30 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Algebraically Structured LWE, Revisited
Chapter number 1
Book title
Theory of Cryptography
Published by
Springer, Cham, December 2019
DOI 10.1007/978-3-030-36030-6_1
Book ISBNs
978-3-03-036029-0, 978-3-03-036030-6
Authors

Chris Peikert, Zachary Pepin, Peikert, Chris, Pepin, Zachary

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 30 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 30 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 23%
Researcher 6 20%
Student > Doctoral Student 2 7%
Student > Bachelor 2 7%
Student > Master 2 7%
Other 2 7%
Unknown 9 30%
Readers by discipline Count As %
Computer Science 17 57%
Mathematics 1 3%
Physics and Astronomy 1 3%
Social Sciences 1 3%
Unknown 10 33%