Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova 0001 |
Two-Round Secure MPC from Indistinguishability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 74-94, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai |
Obfuscation for Evasive Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 26-51, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Berkoff, Feng-Hao Liu |
Leakage Resilient Fully Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 515-539, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran 0001, Alon Rosen |
Lower Bounds in the Hardware Token Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 663-687, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi |
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 688-712, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dana Dachman-Soled, Mohammad Mahmoody, Tal Malkin |
Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 217-239, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martin Hirt, Ueli Maurer, Pavel Raykov |
Broadcast Amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 419-439, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti |
Statistical Concurrent Non-malleable Zero Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 167-191, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou |
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 638-662, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran 0001 |
On the Power of Public-Key Encryption in Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 240-264, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi 0001 |
Continuous Non-malleable Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 465-488, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Mor Weiss |
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 121-145, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell (eds.) |
Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![Springer, 978-3-642-54241-1 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dana Dachman-Soled, Yael Tauman Kalai |
Securing Circuits and Protocols against 1/poly(k) Tampering Rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 540-565, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Takahiro Matsuda 0002 |
On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 265-290, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Min Chung, Rafail Ostrovsky, Rafael Pass, Muthuramakrishnan Venkitasubramaniam, Ivan Visconti |
4-Round Resettably-Sound Zero Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 192-216, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mahdi Cheraghchi, Venkatesan Guruswami |
Non-malleable Coding against Bit-Wise and Split-State Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 440-464, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Elette Boyle, Kai-Min Chung, Rafael Pass |
On Extractability Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 52-73, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Hofheinz, Andy Rupp |
Standard versus Selective Opening Security: Separation and Equivalence Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 591-615, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Aner Ben-Efraim, Carles Padró, Ilya Tyomkin |
Multi-linear Secret-Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 394-418, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski, Guy N. Rothblum |
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 1-25, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dimitar Jetchev, Krzysztof Pietrzak |
How to Fake Auxiliary Input. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 566-590, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto |
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 343-367, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky |
Locally Updatable and Locally Decodable Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 489-514, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gilad Asharov |
Towards Characterizing Complete Fairness in Secure Two-Party Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 291-316, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carmit Hazay, Arpita Patra |
One-Sided Adaptively Secure Two-Party Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 368-393, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hoeteck Wee |
Dual System Encryption via Predicate Encodings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 616-637, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Yuval Ishai, Ranjit Kumaresan, Eyal Kushilevitz |
On the Cryptographic Complexity of the Worst Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 317-342, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Takahiro Matsuda 0002, Goichiro Hanaoka |
Chosen Ciphertext Security via Point Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 95-120, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya |
On the Impossibility of Structure-Preserving Deterministic Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 713-738, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Omkant Pandey |
Achieving Constant Round Leakage-Resilient Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings, pp. 146-166, 2014, Springer, 978-3-642-54241-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shiva Prasad Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, Adam D. Smith |
Analyzing Graphs with Node Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 457-476, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn |
Succinct Malleable NIZKs and an Application to Compact Shuffles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 100-119, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Mahmoody, David Xiao |
Languages with Efficient Zero-Knowledge PCPs are in SZK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 297-314, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dario Catalano, Dario Fiore 0001, Rosario Gennaro, Konstantinos Vamvourellis |
Algebraic (Trapdoor) One-Way Functions and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 680-699, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Serge Fehr, Jonathan Katz, Fang Song 0001, Hong-Sheng Zhou, Vassilis Zikas |
Feasibility and Completeness of Cryptographic Tasks in the Quantum World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 281-296, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid |
Multi-Client Non-interactive Verifiable Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 499-518, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Iftach Haitner, Eran Omri, Hila Zarosim |
Limits on the Usefulness of Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 437-456, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benny Applebaum |
Cryptographic Hardness of Random Local Functions-Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 599, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao |
On the (In)security of Fischlin's Paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 202-221, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Steven A. Myers, Mona Sergi, Abhi Shelat |
Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 397-417, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Eleanor Birrell, Kai-Min Chung, Rafael Pass, Sidharth Telang |
Randomness-Dependent Message Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 700-720, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges |
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 642-661, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Claudio Orlandi, Anat Paskin-Cherniavsky |
On the Power of Correlated Randomness in Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 600-620, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Charalampos Papamanthou, Elaine Shi, Roberto Tamassia |
Signatures of Correct Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 222-242, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass |
Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 334-354, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor |
Hardness Preserving Reductions via Cuckoo Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 40-59, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Huijia Lin, Omer Paneth |
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 80-99, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski |
When Homomorphism Becomes a Liability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 143-161, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry |
Encrypted Messages from the Heights of Cryptomania. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 120-121, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Yu Yu 0001 |
Overcoming Weak Expectations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 1-22, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen |
Attribute-Based Functional Encryption on Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 122-142, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tal Malkin |
Secure Computation for Big Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 355, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell, Hila Zarosim |
On the Feasibility of Extending Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 519-538, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Sarah Zakarias |
Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 621-641, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benny Applebaum |
Garbling XOR Gates "For Free" in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 162-181, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gilad Asharov, Yehuda Lindell, Tal Rabin |
A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 243-262, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth |
Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Amit Sahai (eds.) |
Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![Springer, 978-3-642-36593-5 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas |
Universally Composable Synchronous Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 477-498, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Steve Lu 0001, Rafail Ostrovsky |
Distributed Oblivious RAM for Secure Two-Party Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 377-396, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kfir Barhum, Thomas Holenstein |
A Cookbook for Black-Box Separations and a Recipe for UOWHFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 662-679, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | R. Amzi Jeffs, Mike Rosulek |
Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 263-280, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth |
Succinct Non-interactive Arguments via Linear Interactive Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 315-333, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Hajiabadi, Bruce M. Kapron |
Computational Soundness of Coinductive Symbolic Security under Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 539-558, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Elette Boyle, Shafi Goldwasser, Stefano Tessaro |
Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 356-376, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kashyap Dixit, Madhav Jha, Sofya Raskhodnikova, Abhradeep Thakurta |
Testing the Lipschitz Property over Product Distributions with Applications to Data Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 418-436, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal, Abhishek Jain 0002, Rafail Ostrovsky, Silas Richelson, Ivan Visconti |
Concurrent Zero Knowledge in the Bounded Player Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 60-79, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia |
A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 23-39, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ron Rothblum |
On the Circular Security of Bit-Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 579-598, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Xiao |
Errata to (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 721-722, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain 0002, Yael Tauman Kalai, Adriana López-Alt, Daniel Wichs |
Why "Fiat-Shamir for Proofs" Lacks a Proof. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 182-201, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti |
Revisiting Lower and Upper Bounds for Selective Decommitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 559-578, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anupam Gupta 0001, Aaron Roth 0001, Jonathan R. Ullman |
Iterative Constructions and Private Data Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 339-356, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal, Virendra Kumar, Satyanarayana V. Lokam, Mohammad Mahmoody |
On Black-Box Reductions between Predicate Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 440-457, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Krzysztof Pietrzak, Alon Rosen, Gil Segev 0001 |
Lossy Functions Do Not Amplify Well. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 458-475, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dario Fiore 0001, Dominique Schröder |
Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 636-653, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Itay Berman, Iftach Haitner |
From Non-adaptive to Adaptive Pseudorandom Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 357-368, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shafi Goldwasser, Allison B. Lewko, David A. Wilson |
Bounded-Collusion IBE from Key Homomorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 564-581, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan |
Functional Re-encryption and Collusion-Resistant Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 404-421, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Dziembowski, Sebastian Faust |
Leakage-Resilient Circuits without Computational Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 230-247, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski, Yael Tauman Kalai |
A Parallel Repetition Theorem for Leakage Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 248-265, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Omer Paneth |
Point Obfuscation and 3-Round Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 190-208, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa |
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 169-189, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Mohammad Mahmoody, Amit Sahai |
On Efficient Zero-Knowledge PCPs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 151-168, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jae Hong Seo, Jung Hee Cheon |
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 133-150, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Sebastian Faust, Carmit Hazay |
Secure Two-Party Computation with Low Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 54-74, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Libert, Moti Yung |
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 75-93, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Anindya De |
Lower Bounds in Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 321-338, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters |
Computing on Authenticated Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 1-20, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Abhishek Jain 0002, Tal Moran, Daniel Wichs |
Counterexamples to Hardness Amplification beyond Negligible. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 476-493, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou |
On the Security of the "Free-XOR" Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 39-53, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Ran Canetti, Shai Halevi |
Leakage-Tolerant Interactive Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 266-284, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dimitar Jetchev, Onur Özen, Martijn Stam |
Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 303-320, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Iftach Haitner, Aris Tentes |
On the Instantiability of Hash-and-Sign RSA Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 112-132, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Min Chung, Rafael Pass, Wei-Lung Dustin Tseng |
The Knowledge Tightness of Parallel Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 512-529, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chongwon Cho, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti |
Simultaneously Resettable Arguments of Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 530-547, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benny Applebaum, Andrej Bogdanov, Alon Rosen |
A Dichotomy for Local Small-Bias Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 600-617, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Fuller 0001, Adam O'Neill, Leonid Reyzin |
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 582-599, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Thomas Ristenpart, Salil P. Vadhan |
Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings, pp. 618-635, 2012, Springer, 978-3-642-28913-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|