# Lecture Notes on Cryptography

@inproceedings{Goldwasser2001LectureNO, title={Lecture Notes on Cryptography}, author={Shafi Goldwasser and Mihir Bellare}, year={2001} }

- Published 2001

#### Citations

##### Publications citing this paper.

Showing 1-10 of 87 extracted citations

## Rekeying for Encrypted Deduplication Storage

View 5 Excerpts

Highly Influenced

## Constructions in public-key cryptography over matrix groups

View 5 Excerpts

Highly Influenced

## On non-abelian homomorphic public-key cryptosystems

View 5 Excerpts

Highly Influenced

## Analysis and Design of Cryptographic Hash Functions, Mac Algorithms and Block Ciphers

View 9 Excerpts

Highly Influenced

## A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval

View 4 Excerpts

Highly Influenced

## One Way Functions – Conjecture , Status , Applications and Future Research Scope

View 3 Excerpts

Highly Influenced

## Towards Symbolic Encryption Schemes

View 12 Excerpts

Highly Influenced

## Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically

View 3 Excerpts

Highly Influenced

## Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits

View 4 Excerpts

Highly Influenced

## Public-key cryptography and invariant theory

View 5 Excerpts

Highly Influenced

#### Citation Statistics

#### 132 Citations

Citations per Year

Semantic Scholar estimates that this publication has

**132**citations based on the available data.See our **FAQ** for additional information.

#### References

##### Publications referenced by this paper.

Showing 1-10 of 195 references

## Cryptanalysis of MD4

View 20 Excerpts

Highly Influenced

## Incoercible Multiparty Computation

View 7 Excerpts

Highly Influenced

## How to Exchange (Secret) Keys

View 20 Excerpts

Highly Influenced

## Digitalized signatures as intractable as factorization

View 20 Excerpts

Highly Influenced

## Asymmetric encryption: Evolution and enhancements

View 4 Excerpts

Highly Influenced

## Deniable Encryption

View 4 Excerpts

Highly Influenced

## SKEME: a versatile secure key exchange mechanism for Internet

View 9 Excerpts

Highly Influenced

## Synthesizers and Their Application to the Parallel Construction of Psuedo-Random Functions

View 4 Excerpts

Highly Influenced

## Efficient signature generation by smart cards

View 8 Excerpts

Highly Influenced

## A Certified Digital Signature

View 7 Excerpts

Highly Influenced