Linked e-resources
Details
Table of Contents
Key-Dependent-Message and Selective-Opening Security
Searchable and Fully Homomorphic Encryption
Public-Key Encryption
Encryption with Bad Randomness
Subversion Resistance
Cryptanalysis
Composable Security
Oblivious Transfer
Multiparty Computation
Signatures
Structure-Preserving Signatures
Functional Encryption
Foundations
Obfuscation-Based Cryptographic Constructions
Protocols
Blockchain
Zero-Knowledge
Lattices.
Searchable and Fully Homomorphic Encryption
Public-Key Encryption
Encryption with Bad Randomness
Subversion Resistance
Cryptanalysis
Composable Security
Oblivious Transfer
Multiparty Computation
Signatures
Structure-Preserving Signatures
Functional Encryption
Foundations
Obfuscation-Based Cryptographic Constructions
Protocols
Blockchain
Zero-Knowledge
Lattices.