Linked e-resources
Details
Table of Contents
Lattice attacks and constructions
Obfuscation and functional encryption
Discrete logarithm
Multiparty computation
Universal composability
Zero knowledge
Side-channel attacks and countermeasures
Functional encryption
Elliptic curves
Symmetric cryptanalysis
Provable security for symmetric cryptography
security models:- Blockchain
Memory hard functions
Symmetric-key constructions
Obfuscation
Quantum cryptography
Public-key encryption and key-exchange.
Obfuscation and functional encryption
Discrete logarithm
Multiparty computation
Universal composability
Zero knowledge
Side-channel attacks and countermeasures
Functional encryption
Elliptic curves
Symmetric cryptanalysis
Provable security for symmetric cryptography
security models:- Blockchain
Memory hard functions
Symmetric-key constructions
Obfuscation
Quantum cryptography
Public-key encryption and key-exchange.