Keyphrases
Adaptive Security
19%
Adaptively Secure
25%
Adversary
68%
Authenticated Communication
22%
Canetti
18%
CCA Security
22%
Chosen-ciphertext Attack
24%
Common Reference String
31%
Communication Complexity
15%
Composable Security
22%
Constant Rounds
14%
Cryptographic
28%
Cryptographic Primitives
15%
Cryptographic Protocols
43%
Delegation of Computation
18%
Encryption
19%
Encryption Scheme
23%
Grey-box
14%
Hash Function
21%
Indistinguishability Obfuscation
29%
Key Exchange
21%
Key Exchange Protocol
28%
Knowledge Argument
15%
Multi-party Computation
19%
Multi-party Protocol
15%
Multicast
17%
Non-interactive
25%
Non-interactive Zero-knowledge
26%
Obfuscation
59%
Obfuscator
35%
Oblivious Transfer
16%
One-way Function
52%
Oracle
19%
Plain Model
26%
Public Key
14%
Random Oracle
31%
Random Oracle Model
20%
Secure Computation
33%
Secure multi-party Computation
25%
Secure Protocol
29%
Security Analysis
27%
Security Assurance
17%
Security Framework
16%
Security Properties
30%
Signature Scheme
15%
String Model
28%
Universal Composition
17%
Universally Composable
68%
Universally Composable Security
52%
Zero-knowledge
15%
Computer Science
Attackers
19%
Authenticated Key Exchange
11%
Authentication
33%
Automaton
11%
chosen ciphertext attack
12%
chosen ciphertext security
11%
Ciphertext
17%
Communication Complexity
15%
Composition Operation
11%
Computable Function
9%
Computational Modeling
15%
Computational Power
10%
Cryptographic Application
18%
Cryptographic Primitive
30%
Cryptographic Protocol
74%
Diffie-Hellman-Merkle key exchange
22%
Encryption Scheme
49%
Forward Secrecy
11%
Function Evaluation
14%
Hash Function
48%
Hashing
11%
identity based encryption
9%
Input/Output
12%
Internal State
12%
Key Exchange Protocol
35%
Knowledge Proof
10%
Knowledge Protocol
19%
Learning with Errors
14%
Modified Version
11%
Multicasting
15%
Obfuscation
100%
Password
34%
Polynomial Time
14%
public key
33%
public-key encryption
15%
public-key infrastructure
9%
random oracle model
40%
Reference String
63%
Secure Communication
16%
secure multiparty computation
28%
Secure Protocol
35%
Security Analysis
43%
Security Framework
28%
Security Parameter
18%
Security Properties
52%
Security protocols
18%
Security Requirements
9%
Signature Scheme
19%
Soundness
12%
Symmetric Encryption
10%