Linked e-resources
Details
Table of Contents
Key exchange
Multilinear maps and obfuscation.-Pseudorandom function extensions
Secure computation
foundations and algorithms
Network security
Functional encryption
Cryptanalysis
Secure computation
implementation
Zero knowledge
Message authentication
Proofs of space and erasure
Public-key encryption.
Multilinear maps and obfuscation.-Pseudorandom function extensions
Secure computation
foundations and algorithms
Network security
Functional encryption
Cryptanalysis
Secure computation
implementation
Zero knowledge
Message authentication
Proofs of space and erasure
Public-key encryption.