

14.3 From linear homomorphism to full homomorphism.14.2.1 Abstraction: A trapdoor pseudorandom generator.14.2 Example: An XOR homomorphic encryption.14.1.1 Another application: fully homomorphic encryption for verifying computation.14.1 Defining fully homomorphic encryption.14 Fully homomorphic encryption: Introduction and bootstrapping.4.4 Arbitrary input length extension for MACs and PRFs.4.1.2 Modifying input and output lengths of PRFs.4.1.1 How do pseudorandom functions help in the login problem?.4.1 One time passwords (e.g. Google Authenticator, RSA ID, etc.).3.4 Non-constructive existence of pseudorandom generators.3.3.3 Case Study 3: Blum, Blum and Shub.3.3.1 Case Study 1: Subset Sum Generator.3.2.4 Attempt 2: Linear Congruential Generators with dropped bits.3.2.2 Attempt 1: The linear checksum / linear feedback shift register (LFSR).

3.2 What do pseudorandom generators actually look like?.3.0.1 Unpredictability: an alternative approach for proving the length extension theorem.0.4.2 Collections of independent random variables.0.2.1 Example: The existence of infinitely many primes.0.1 A quick overview of mathematical prerequisites.An intensive introduction to cryptography.
