Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia |
Resettable Statistical Zero Knowledge. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Cramer (eds.) |
Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Blazy, David Pointcheval, Damien Vergnaud |
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Jain 0002, Krzysztof Pietrzak, Aris Tentes |
Hardness Preserving Constructions of Pseudorandom Functions. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Krzysztof Pietrzak |
Subspace LWE. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin |
Computational Extractors and Pseudorandomness. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Rafail Ostrovsky, Hakan Seyalioglu |
Identifying Cheaters without an Honest Majority. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ueli Maurer, Andreas Rüedlinger, Björn Tackmann |
Confidentiality and Integrity: A Constructive Perspective. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Avradip Mandal, Jacques Patarin, Yannick Seurin |
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bryan Parno, Mariana Raykova 0001, Vinod Vaikuntanathan |
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell, Benny Pinkas |
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Eric Miles, Emanuele Viola |
On the Complexity of Non-adaptively Increasing the Stretch of Pseudorandom Generators. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Gehrke, Edward Lui, Rafael Pass |
Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gunnar Kreitz |
A Zero-One Law for Secure Multi-party Computation with Ternary Outputs. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai (eds.) |
Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich |
Impossibility of Blind Signatures from One-Way Permutations. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski, Shafi Goldwasser, Yael Tauman Kalai |
Black-Box Circular-Secure Encryption beyond Affine Functions. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam |
Towards Non-Black-Box Lower Bounds in Cryptography. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Vinod Vaikuntanathan |
Round-Optimal Password-Based Authenticated Key Exchange. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Luca Trevisan |
Dense Model Theorems and Their Applications. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David Xiao |
(Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Tessaro |
Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan R. Ullman, Salil P. Vadhan |
PCPs and the Hardness of Generating Private Synthetic Data. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran 0001, Mike Rosulek |
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade |
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Amit Sahai, Brent Waters |
Functional Encryption: Definitions and Challenges. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dana Dachman-Soled, Yehuda Lindell, Mohammad Mahmoody, Tal Malkin |
On the Black-Box Complexity of Optimally-Fair Coin Tossing. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass |
Concurrent Security and Non-malleability. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tal Malkin, Isamu Teranishi, Yevgeniy Vahlis, Moti Yung |
Signatures Resilient to Continual Leakage on Memory and Computation. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen |
Perfectly Secure Oblivious RAM without Random Oracles. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski, Jonathan Katz, Gil Segev 0001, Arkady Yerukhimovich |
Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shai Halevi, Huijia Lin |
After-the-Fact Leakage in Public-Key Encryption. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Andrej Bogdanov, Alon Rosen |
Input Locality and Hardness Amplification. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Kraschewski, Jörn Müller-Quade |
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Esther Hänggi, Jürg Wullschleger |
Tight Bounds for Classical and Quantum Coin Flipping. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Adam Groce, Jonathan Katz, Arkady Yerukhimovich |
Limits of Computational Differential Privacy in the Client/Server Setting. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ron Rothblum |
Homomorphic Encryption: From Private-Key to Public-Key. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Josh Bronson, Ali Juma, Periklis A. Papakonstantinou |
Limits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Huijia Lin, Rafael Pass |
Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Dziembowski, Tomasz Kazana, Daniel Wichs |
One-Time Computable Self-erasing Functions. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Jain 0002, Krzysztof Pietrzak |
Parallel Repetition for Leakage Resilience Amplification Revisited. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal, Adam O'Neill, Vanishree Rao |
Correlated-Input Secure Hash Functions. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Takahiro Matsuda 0002, Kanta Matsuura |
On Black-Box Separations among Injective One-Way Functions. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Holenstein, Grant Schoenebeck |
General Hardness Amplification of Predicates and Puzzles - (Extended Abstract). |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Brent Waters, Scott Yilek |
Identity-Based Encryption Secure against Selective Opening Attack. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Allison B. Lewko, Yannis Rouselakis, Brent Waters |
Achieving Leakage Resilience through Dual System Encryption. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sanjam Garg, Vipul Goyal, Abhishek Jain 0002, Amit Sahai |
Bringing People of Different Beliefs Together to Do UC. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Green 0001, Susan Hohenberger |
Practical Adaptive Oblivious Transfer from Simple Assumptions. |
TCC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Martin Geisler 0001, Jesper Buus Nielsen |
From Passive to Covert Security at Low Cost. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi |
On the Necessary and Sufficient Assumptions for UC Computation. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass, Muthuramakrishnan Venkitasubramaniam |
Private Coins versus Public Coins in Zero-Knowledge Proof Systems. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Johan Håstad, Rafael Pass, Douglas Wikström, Krzysztof Pietrzak |
An Efficient Parallel Repetition Theorem. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch |
Privacy-Enhancing Cryptography: From Theory into Practice. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Shiva Prasad Kasiviswanathan, Kobbi Nissim |
Bounds on the Sample Complexity for Private Learning and Private Data Release. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia |
Founding Cryptography on Tamper-Proof Hardware Tokens. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Eleanor Birrell, Salil P. Vadhan |
Composition of Zero-Knowledge Proofs with Efficient Provers. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin, Anja Lehmann |
Delayed-Key Message Authentication for Streams. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Allison B. Lewko, Brent Waters |
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Guy N. Rothblum, Mayank Varia |
Obfuscation of Hyperplane Membership. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Libert, Moti Yung |
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum |
Leakage-Resilient Signatures. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Kolesnikov |
Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vadim Lyubashevsky, Adriana Palacio, Gil Segev 0001 |
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Gert Læssøe Mikkelsen |
Efficient, Robust and Constant-Round Distributed RSA Key Generation. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rafail Ostrovsky, Omkant Pandey, Ivan Visconti |
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Vahlis |
Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Cramer, Dennis Hofheinz, Eike Kiltz |
A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai |
On Complete Primitives for Fairness. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Min Chung, Feng-Hao Liu |
Parallel Repetition Theorems for Interactive Arguments. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ronen Gradwohl |
Rationality in the Full-Information Model. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | David Goldenberg, Moses D. Liskov |
On Related-Secret Pseudorandomness. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Oriol Farràs, Carles Padró |
Ideal Hierarchical Secret Sharing Schemes. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, Vinod Vaikuntanathan |
Public-Key Encryption Schemes with Auxiliary Inputs. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer, Stefano Tessaro |
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam |
Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs |
On Symmetric Encryption and Point Obfuscation. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Endre Bangerter, Jan Camenisch, Stephan Krenn |
Efficiency Limitations for Σ-Protocols for Group Homomorphisms. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Georg Fuchsbauer, Jonathan Katz, David Naccache |
Efficient Rational Secret Sharing in Standard Communication Networks. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin |
A Domain Extender for the Ideal Cipher. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rikke Bendlin, Ivan Damgård |
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Mihir Bellare, Gregory Neven |
Robust Encryption. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Charanjit S. Jutla |
Almost Optimal Bounds for Direct Product Threshold Theorem. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai |
Secure Computation and Its Diverse Applications. |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Micciancio (eds.) |
Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings |
TCC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jesper Buus Nielsen, Claudio Orlandi |
LEGO for Two-Party Secure Computation. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Ilan Orlov |
Secret Sharing and Non-Shannon Information Inequalities. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Mayank Varia |
Non-malleable Obfuscation. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Robin Künzler, Jörn Müller-Quade, Dominik Raub |
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
long-term security, corrupted majority, information-theoretic security, secure function evaluation |
1 | Yehuda Lindell, Hila Zarosim |
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Vassilis Zikas, Sarah Hauser, Ueli M. Maurer |
Realistic Failures in Secure Multi-party Computation. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai |
Secure Arithmetic Computation with No Honest Majority. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Ronny Ramzi Dakdouk |
Towards a Theory of Extractable Functions. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yair Amir, Paul Bunn, Rafail Ostrovsky |
Authenticated Adversarial Routing. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
End-to-End Communication, Communication Complexity, Error-Correction, Network Routing, Fault Localization, Multi-Party Computation |
1 | Craig Gentry, Shai Halevi |
Hierarchical Identity Based Encryption with Polynomially Many Levels. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod Vaikuntanathan |
How Efficient Can Memory Checking Be?. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Tal Moran, Moni Naor, Gil Segev 0001 |
An Optimally Fair Coin Toss. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Stanislaw Jarecki, Xiaomin Liu |
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Omer Reingold (eds.) |
Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | James Cook, Omid Etesami, Rachel Miller, Luca Trevisan |
Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Micali, Abhi Shelat |
Purely Rational Secret Sharing (Extended Abstract). |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|