The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "TCC"( http://dblp.L3S.de/Venues/TCC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/tcc

Publication years (Num. hits)
2004 (29) 2005 (33) 2006 (32) 2007 (32) 2008 (35) 2009 (36) 2010 (36) 2011 (38) 2012 (37) 2013 (42) 2014 (31)
Publication types (Num. hits)
inproceedings(370) proceedings(11)
Venues (Conferences, Journals, ...)
TCC(381)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 58 occurrences of 51 keywords

Results
Found 381 publication records. Showing 381 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia Resettable Statistical Zero Knowledge. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ronald Cramer (eds.) Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, David Pointcheval, Damien Vergnaud Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abhishek Jain 0002, Krzysztof Pietrzak, Aris Tentes Hardness Preserving Constructions of Pseudorandom Functions. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Krzysztof Pietrzak Subspace LWE. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin Computational Extractors and Pseudorandomness. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Rafail Ostrovsky, Hakan Seyalioglu Identifying Cheaters without an Honest Majority. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ueli Maurer, Andreas Rüedlinger, Björn Tackmann Confidentiality and Integrity: A Constructive Perspective. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Avradip Mandal, Jacques Patarin, Yannick Seurin On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bryan Parno, Mariana Raykova 0001, Vinod Vaikuntanathan How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption. Search on Bibsonomy TCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell, Benny Pinkas Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Eric Miles, Emanuele Viola On the Complexity of Non-adaptively Increasing the Stretch of Pseudorandom Generators. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Johannes Gehrke, Edward Lui, Rafael Pass Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gunnar Kreitz A Zero-One Law for Secure Multi-party Computation with Ternary Outputs. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuval Ishai (eds.) Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich Impossibility of Blind Signatures from One-Way Permutations. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski, Shafi Goldwasser, Yael Tauman Kalai Black-Box Circular-Secure Encryption beyond Affine Functions. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam Towards Non-Black-Box Lower Bounds in Cryptography. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Vinod Vaikuntanathan Round-Optimal Password-Based Authenticated Key Exchange. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Luca Trevisan Dense Model Theorems and Their Applications. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David Xiao (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stefano Tessaro Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jonathan R. Ullman, Salil P. Vadhan PCPs and the Hardness of Generating Private Synthetic Data. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran 0001, Mike Rosulek Exploring the Limits of Common Coins Using Frontier Analysis of Protocols. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Amit Sahai, Brent Waters Functional Encryption: Definitions and Challenges. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dana Dachman-Soled, Yehuda Lindell, Mohammad Mahmoody, Tal Malkin On the Black-Box Complexity of Optimally-Fair Coin Tossing. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rafael Pass Concurrent Security and Non-malleability. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tal Malkin, Isamu Teranishi, Yevgeniy Vahlis, Moti Yung Signatures Resilient to Continual Leakage on Memory and Computation. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen Perfectly Secure Oblivious RAM without Random Oracles. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski, Jonathan Katz, Gil Segev 0001, Arkady Yerukhimovich Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shai Halevi, Huijia Lin After-the-Fact Leakage in Public-Key Encryption. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Andrej Bogdanov, Alon Rosen Input Locality and Hardness Amplification. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniel Kraschewski, Jörn Müller-Quade Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Esther Hänggi, Jürg Wullschleger Tight Bounds for Classical and Quantum Coin Flipping. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Adam Groce, Jonathan Katz, Arkady Yerukhimovich Limits of Computational Differential Privacy in the Client/Server Setting. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ron Rothblum Homomorphic Encryption: From Private-Key to Public-Key. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Josh Bronson, Ali Juma, Periklis A. Papakonstantinou Limits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Huijia Lin, Rafael Pass Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stefan Dziembowski, Tomasz Kazana, Daniel Wichs One-Time Computable Self-erasing Functions. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Abhishek Jain 0002, Krzysztof Pietrzak Parallel Repetition for Leakage Resilience Amplification Revisited. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vipul Goyal, Adam O'Neill, Vanishree Rao Correlated-Input Secure Hash Functions. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Takahiro Matsuda 0002, Kanta Matsuura On Black-Box Separations among Injective One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thomas Holenstein, Grant Schoenebeck General Hardness Amplification of Predicates and Puzzles - (Extended Abstract). Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Brent Waters, Scott Yilek Identity-Based Encryption Secure against Selective Opening Attack. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Allison B. Lewko, Yannis Rouselakis, Brent Waters Achieving Leakage Resilience through Dual System Encryption. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sanjam Garg, Vipul Goyal, Abhishek Jain 0002, Amit Sahai Bringing People of Different Beliefs Together to Do UC. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Matthew Green 0001, Susan Hohenberger Practical Adaptive Oblivious Transfer from Simple Assumptions. Search on Bibsonomy TCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Martin Geisler 0001, Jesper Buus Nielsen From Passive to Covert Security at Low Cost. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi On the Necessary and Sufficient Assumptions for UC Computation. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rafael Pass, Muthuramakrishnan Venkitasubramaniam Private Coins versus Public Coins in Zero-Knowledge Proof Systems. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Johan Håstad, Rafael Pass, Douglas Wikström, Krzysztof Pietrzak An Efficient Parallel Repetition Theorem. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jan Camenisch Privacy-Enhancing Cryptography: From Theory into Practice. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Shiva Prasad Kasiviswanathan, Kobbi Nissim Bounds on the Sample Complexity for Private Learning and Private Data Release. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia Founding Cryptography on Tamper-Proof Hardware Tokens. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Eleanor Birrell, Salil P. Vadhan Composition of Zero-Knowledge Proofs with Efficient Provers. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Anja Lehmann Delayed-Key Message Authentication for Streams. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Allison B. Lewko, Brent Waters New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Guy N. Rothblum, Mayank Varia Obfuscation of Hyperplane Membership. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Benoît Libert, Moti Yung Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum Leakage-Resilient Signatures. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vladimir Kolesnikov Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vadim Lyubashevsky, Adriana Palacio, Gil Segev 0001 Public-Key Cryptographic Primitives Provably as Secure as Subset Sum. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Gert Læssøe Mikkelsen Efficient, Robust and Constant-Round Distributed RSA Key Generation. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rafail Ostrovsky, Omkant Pandey, Ivan Visconti Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yevgeniy Vahlis Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Dennis Hofheinz, Eike Kiltz A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai On Complete Primitives for Fairness. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kai-Min Chung, Feng-Hao Liu Parallel Repetition Theorems for Interactive Arguments. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ronen Gradwohl Rationality in the Full-Information Model. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1David Goldenberg, Moses D. Liskov On Related-Secret Pseudorandomness. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Oriol Farràs, Carles Padró Ideal Hierarchical Secret Sharing Schemes. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, Vinod Vaikuntanathan Public-Key Encryption Schemes with Auxiliary Inputs. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer, Stefano Tessaro A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs On Symmetric Encryption and Point Obfuscation. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Endre Bangerter, Jan Camenisch, Stephan Krenn Efficiency Limitations for Σ-Protocols for Group Homomorphisms. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Georg Fuchsbauer, Jonathan Katz, David Naccache Efficient Rational Secret Sharing in Standard Communication Networks. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin A Domain Extender for the Ideal Cipher. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rikke Bendlin, Ivan Damgård Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Mihir Bellare, Gregory Neven Robust Encryption. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Charanjit S. Jutla Almost Optimal Bounds for Direct Product Threshold Theorem. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yuval Ishai Secure Computation and Its Diverse Applications. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniele Micciancio (eds.) Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jesper Buus Nielsen, Claudio Orlandi LEGO for Two-Party Secure Computation. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Ilan Orlov Secret Sharing and Non-Shannon Information Inequalities. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Mayank Varia Non-malleable Obfuscation. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Robin Künzler, Jörn Müller-Quade, Dominik Raub Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF long-term security, corrupted majority, information-theoretic security, secure function evaluation
1Yehuda Lindell, Hila Zarosim Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Vassilis Zikas, Sarah Hauser, Ueli M. Maurer Realistic Failures in Secure Multi-party Computation. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai Secure Arithmetic Computation with No Honest Majority. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Ronny Ramzi Dakdouk Towards a Theory of Extractable Functions. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yair Amir, Paul Bunn, Rafail Ostrovsky Authenticated Adversarial Routing. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF End-to-End Communication, Communication Complexity, Error-Correction, Network Routing, Fault Localization, Multi-Party Computation
1Craig Gentry, Shai Halevi Hierarchical Identity Based Encryption with Polynomially Many Levels. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod Vaikuntanathan How Efficient Can Memory Checking Be?. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tal Moran, Moni Naor, Gil Segev 0001 An Optimally Fair Coin Toss. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Stanislaw Jarecki, Xiaomin Liu Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Omer Reingold (eds.) Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1James Cook, Omid Etesami, Rachel Miller, Luca Trevisan Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Silvio Micali, Abhi Shelat Purely Rational Secret Sharing (Extended Abstract). Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 381 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license