Computer Science
Access Structure
8%
Approximation (Algorithm)
9%
Arbitrary Number
10%
Arithmetic Circuit
20%
Binary Symmetric Channel
5%
Boolean Circuit
23%
Boolean Function
9%
Communication Complexity
41%
Communication Cost
9%
Communication Overhead
5%
Complexity Class
7%
Computational Complexity
8%
Computational Cost
9%
Cryptographic Application
15%
Cryptographic Primitive
33%
Cryptographic Protocol
12%
Encryption Scheme
16%
Existing Protocol
5%
Fully Homomorphic Encryption
7%
Function Evaluation
8%
Function Point
12%
Hash Function
22%
Hashing
11%
Homomorphic Encryption
11%
Information Retrieval
38%
information theoretic security
9%
Knowledge Proof
29%
Learning with Errors
6%
Linear Function
10%
Malicious Adversary
12%
Minimal Distance
6%
Obfuscation
25%
Online Communication
7%
Perfect Security
6%
Polynomial Time
13%
Proof System
7%
Protocol Message
10%
public key
9%
Public-Key Cryptography
6%
public-key encryption
10%
random oracle model
10%
Secret Sharing
47%
secret sharing scheme
30%
secure multiparty computation
100%
Secure Protocol
24%
Security Parameter
20%
side-channel
5%
Soundness
11%
Symmetric Encryption
5%
Time Computable Function
7%
Mathematics
Approximates
7%
Black Box
21%
Hash Function
12%
Indistinguishability
10%
Input Bit
7%
Integer
6%
Intractability
8%
Linear Code
7%
Main Result
12%
Number
24%
One-Way Function
16%
Point Function
6%
Polynomial
20%
Probability Theory
5%