Skip to main navigation
Skip to search
Skip to main content
Sort by
Keyphrases
One-way Function
100%
Constant Rounds
43%
Black Box
40%
Non-interactive Zero-knowledge
38%
Non-malleable Commitments
38%
Zero-knowledge
36%
Cryptography
32%
Indistinguishability Obfuscation
32%
Polynomial Time
30%
Hardness Assumptions
29%
Adversary
29%
Non-interactive
25%
Obfuscation
24%
Secure Computation
23%
Kolmogorov Complexity
23%
Zero-knowledge Protocols
21%
Collision-Resistant Hash Function
21%
Attacker
21%
Verifier
20%
Nash Equilibrium
20%
Non-malleability
19%
Commitment Scheme
19%
Plain Model
18%
Zero-knowledge Arguments
18%
Subexponential
18%
Non-black-box
17%
Black-box Reductions
17%
Cryptographic
17%
Encryption Scheme
17%
Cryptographic Protocols
17%
Prover
16%
Cryptographic Primitives
16%
Non-malleable
15%
Provable Security
15%
Time-bounded Kolmogorov Complexity
15%
Zero-knowledge Proof
15%
Game Theory
14%
Common Reference String
14%
Sequential Equilibrium
13%
Public Key
13%
Parallel Repetition Theorem
13%
Obfuscator
12%
Black-box Construction
12%
Parallel Repetition
11%
Time-dependent Simulation
11%
CCA Security
11%
Solution Concepts
11%
Tight
11%
Imperfect Recall
11%
Trapdoor Permutations
11%
Computer Science
Polynomial Time
66%
Hash Function
55%
Obfuscation
52%
Soundness
37%
Knowledge Protocol
34%
Attackers
30%
Kolmogorov Complexity
25%
Nash Equilibrium
24%
Encryption Scheme
23%
Cryptographic Protocol
23%
Reference String
22%
Cryptographic Primitive
22%
Knowledge Proof
22%
public key
19%
Turing Machine
16%
secure multiparty computation
15%
Concurrent Execution
14%
Blockchain
14%
Security Properties
14%
Problem Complexity
14%
provably secure
12%
random oracle model
11%
Solution Concept
11%
Simulation Box
11%
Consensus Protocol
10%
Communication Complexity
10%
public-key encryption
9%
Cryptocurrency
8%
Finite Automata
8%
Parallel Running Time
8%
Mechanism Design
8%
Authentication
8%
Simulation Mode
8%
Building-Blocks
8%
Secure Protocol
7%
Security Parameter
7%
Bitcoin
7%
Differential Privacy
6%
State Machine
6%
Proof System
6%
Computer Hardware
6%
Password
6%
Signature Scheme
6%
Protocol Execution
6%
Authenticated Key Exchange
6%
Underlying Assumption
6%
Learning with Errors
6%
Axiomatization
5%
Unified Framework
5%
Decision Theory
5%