Keyphrases
Adversary
71%
Universally Composable
71%
Obfuscation
61%
Universally Composable Security
54%
One-way Function
54%
Cryptographic Protocols
45%
Obfuscator
37%
Secure Computation
34%
Common Reference String
32%
Random Oracle
32%
Security Properties
31%
Secure Protocol
31%
Indistinguishability Obfuscation
30%
String Model
30%
Cryptographic
30%
Key Exchange Protocol
29%
Security Analysis
28%
Non-interactive Zero-knowledge
27%
Plain Model
27%
Secure multi-party Computation
26%
Adaptively Secure
26%
Non-interactive
26%
Chosen-ciphertext Attack
25%
Encryption Scheme
24%
Composable Security
23%
CCA Security
23%
Authenticated Communication
22%
Key Exchange
22%
Hash Function
22%
Random Oracle Model
20%
Multi-party Computation
20%
Oracle
20%
Adaptive Security
20%
Encryption
19%
Delegation of Computation
19%
Canetti
18%
Security Assurance
18%
Multicast
18%
Universal Composition
18%
Oblivious Transfer
16%
Security Framework
16%
Multi-party Protocol
16%
Signature Scheme
15%
Zero-knowledge
15%
Knowledge Argument
15%
Cryptographic Primitives
15%
Communication Complexity
15%
Public Key
15%
Constant Rounds
15%
Grey-box
15%
Computer Science
Obfuscation
100%
Cryptographic Protocol
77%
Reference String
65%
Security Properties
54%
Encryption Scheme
51%
Hash Function
50%
Security Analysis
45%
random oracle model
41%
Secure Protocol
37%
Key Exchange Protocol
36%
Password
35%
Authentication
35%
public key
34%
Cryptographic Primitive
31%
secure multiparty computation
29%
Security Framework
29%
Diffie-Hellman-Merkle key exchange
23%
Knowledge Protocol
20%
Attackers
20%
Signature Scheme
19%
Cryptographic Application
18%
Security protocols
18%
Ciphertext
18%
Security Parameter
17%
Secure Communication
17%
public-key encryption
16%
Computational Modeling
15%
Communication Complexity
15%
Multicasting
15%
Function Evaluation
14%
Polynomial Time
14%
Learning with Errors
14%
Internal State
13%
chosen ciphertext attack
13%
Input/Output
12%
Soundness
12%
Composition Operation
12%
chosen ciphertext security
11%
Authenticated Key Exchange
11%
Hashing
11%
Automaton
11%
Modified Version
11%
Forward Secrecy
11%
Computational Power
11%
Knowledge Proof
10%
Symmetric Encryption
10%
public-key infrastructure
10%
identity based encryption
9%
Computable Function
9%
Security Requirements
9%