Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
62
views
0
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,023
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Advances in Cryptology – CRYPTO 2017
other
Editor(s):
Jonathan Katz
,
Hovav Shacham
Publication date
(Print):
2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Advances in Autism
Author and book information
Book
ISBN (Print):
978-3-319-63687-0
ISBN (Electronic):
978-3-319-63688-7
Publication date (Print):
2017
DOI:
10.1007/978-3-319-63688-7
SO-VID:
191d5383-0827-43de-bd35-a7060b0933ef
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks
pp. 36
Generic Transformations of Predicate Encodings: Constructions and Applications
pp. 101
Memory-Tight Reductions
pp. 133
Be Adaptive, Avoid Overcommitting
pp. 188
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
pp. 223
Secure Arithmetic Computation with Constant Computational Overhead
pp. 255
Encryption Switching Protocols Revisited: Switching Modulo p
pp. 291
The Bitcoin Backbone Protocol with Chains of Variable Difficulty
pp. 324
Bitcoin as a Transaction Ledger: A Composable Treatment
pp. 357
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
pp. 391
Robust Non-interactive Multiparty Computation Against Constant-Size Collusion
pp. 420
The Price of Low Communication in Secure Multi-party Computation
pp. 447
Topology-Hiding Computation on All Graphs
pp. 468
A New Approach to Round-Optimal Secure Multiparty Computation
pp. 503
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
pp. 537
Identity-Based Encryption from the Diffie-Hellman Assumption
pp. 570
The First Collision for Full SHA-1
pp. 599
Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs
pp. 630
Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs
pp. 661
Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives
pp. 696
Structure vs. Hardness Through the Obfuscation Lens
pp. 727
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations
pp. 758
Conditional Disclosure of Secrets via Non-linear Reconstruction
Similar content
2,023
Echoes from Sepharad: signatures on the maternal gene pool of crypto-Jewish descendants
Authors:
Inês Nogueiro
,
João Carlos TEIXEIRA
,
António Amorim
…
Detection and prevention of crypto-ransomware
Authors:
Daniel González
,
Thaier Hayajneh
Crypto++ 5.6 Benchmark
Authors:
W Dai
See all similar
Cited by
3
Security and Privacy in Connected Vehicle Cyber Physical System Using Zero Knowledge Succinct Non Interactive Argument of Knowledge over Blockchain
Authors:
Rabia Khan
,
Amjad Mehmood
,
Zeeshan Iqbal
…
Oceanic Games: Centralization Risks and Incentives in Blockchain Mining
Authors:
Nikos Leonardos
,
Stefanos Leonardos
,
Georgios Piliouras
Using fuzzy bits and neural networks to partially invert few rounds of some cryptographic hash functions
Authors:
Sergij Goncharov
See all cited by