Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Juan A. Garay, Philip D. MacKenzie, Manoj Prabhakaran 0001, Ke Yang |
Resource Fairness and Composability of Cryptographic Protocols. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hoeteck Wee |
Finding Pessiland. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil P. Vadhan |
Concurrent Zero Knowledge Without Complexity Assumptions. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Jonathan Herzog |
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek |
Separating Sources for Encryption and Secret Sharing. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chris Peikert |
On Error Correction in the Exponent. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Fitzi, Juan A. Garay, Shyamnath Gollakota, C. Pandu Rangan, K. Srinathan |
Round-Optimal and Efficient Verifiable Secret Sharing. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Charanjit S. Jutla |
PRF Domain Extension Using DAGs. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov |
Games and the Impossibility of Realizable Ideal Functionality. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zuzana Beerliová-Trubíniová, Martin Hirt |
Efficient Multi-party Computation with Dispute Control. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Tal Malkin, Ryan Moriarty, Nikolai Yakovenko |
Generalized Environmental Security from Number Theoretic Assumptions. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Eike Kiltz |
Chosen-Ciphertext Security from Tag-Based Encryption. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chris Peikert, Alon Rosen |
Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shai Halevi, Tal Rabin (eds.) |
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung |
Threshold and Proactive Pseudo-Random Permutations. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
Distributed Block Ciphers, Distributed Luby-Rackoff Construction, Oblivious Pseudo-Random Functions, Threshold Cryptography |
1 | Vladimir Kolesnikov, Charles Rackoff |
Key Exchange Using Passwords and Long Keys. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chiu-Yuen Koo |
Secure Computation with Partial Message Loss. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Richard J. Lipton, Shabsi Walfish |
Perfectly Secure Password Protocols in the Bounded Retrieval Model. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Nelly Fazio, Antonio Nicolosi |
Non-interactive Zero-Knowledge from Homomorphic Encryption. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Minh-Huyen Nguyen |
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Joe Kilian (eds.) |
Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jens Groth |
Cryptography in Subgroups of Zn. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Shafi Goldwasser, Dmitriy Kharchenko |
Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Shai Halevi, Jonathan Katz |
Adaptively-Secure, Non-interactive Public-Key Encryption. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell |
Upper and Lower Bounds on Black-Box Steganography. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Henry C. Lin, Luca Trevisan, Hoeteck Wee |
On Hardness Amplification of One-Way Functions. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar |
A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Micali, Chris Peikert, Madhu Sudan 0001, David A. Wilson |
Optimal Error Correction Against Computationally Bounded Noise. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan |
On the Relationships Between Notions of Simulation-Based Security. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Renato Renner, Robert König |
Universally Composable Privacy Amplification Against Quantum Adversaries. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky |
Sufficient Conditions for Collision-Resistant Hashing. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
private information-retrieval, homomorphic encryption, Collision-resistant hash functions |
1 | Yevgeniy Dodis, Jonathan Katz |
Chosen-Ciphertext Security of Multiple Encryption. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yan Zong Ding |
Error Correction in the Bounded Storage Model. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Cramer, Ivan Damgård, Yuval Ishai |
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Moni Naor, Asaf Nussboim, Eran Tromer |
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Adam D. Smith |
Entropic Security and the Encryption of High Entropy Messages. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold |
Keyword Search and Oblivious Pseudorandom Functions. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
Secure keyword search, oblivious pseudorandom functions, secure two-party protocols, private information retrieval, privacy-preserving protocols |
1 | Michael Backes 0001, Christian Cachin |
Public-Key Steganography with Active Attacks. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Micciancio, Saurabh Panjwani |
Adaptive Security of Symbolic Encryption. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Susan Hohenberger, Anna Lysyanskaya |
How to Securely Outsource Cryptographic Computations. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Eike Kiltz, Gregor Leander, John Malone-Lee |
Secure Computation of the Mean and Related Statistics. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Eu-Jin Goh, Kobbi Nissim |
Evaluating 2-DNF Formulas on Ciphertexts. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Shai Halevi, Michael Steiner 0001 |
Hardness Amplification of Weakly Verifiable Puzzles. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Shuchi Chawla 0001, Cynthia Dwork, Frank McSherry, Adam D. Smith, Hoeteck Wee |
Toward Privacy in Public Databases. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Stanislaw Jarecki, Nitesh Saxena |
Further Simplifications in Proactive RSA Signatures. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Matt Lepinski, Silvio Micali, Abhi Shelat |
Fair-Zero Knowledge. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael Ben-Or, Michal Horodecki, Debbie W. Leung, Dominic Mayers, Jonathan Oppenheim |
The Universal Composable Security of Quantum Key Distribution. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Hofheinz, Dominique Unruh |
Comparing Two Notions of Simulatability. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Tamir Tassa, Enav Weinreb |
Characterizing Ideal Weighted Threshold Secret Sharing. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Yehuda Lindell |
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Manoj Prabhakaran 0001, Amit Sahai |
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto |
A Universally Composable Secure Channel Based on the KEM-DEM Framework. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
A General Composition Theorem for Secure Reactive Systems. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Moni Naor (eds.) |
Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Boaz Barak, Rafael Pass |
On the Possibility of One-Message Weak Zero-Knowledge. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell |
Lower Bounds for Concurrent Self Composition. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ronald L. Rivest |
On the Notion of Pseudo-Free Groups. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Micciancio, Bogdan Warinschi |
Soundness of Formal Encryption in the Presence of Active Adversaries. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer, Krzysztof Pietrzak |
Composition of Random Systems: When Two Weak Make One Strong. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Serge Fehr, Kirill Morozov, Louis Salvail |
Unfair Noisy Channels and Oblivious Transfer. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Minh-Huyen Nguyen, Salil P. Vadhan |
Simpler Session-Key Generation from Short Random Passwords. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Hofheinz, Jörn Müller-Quade |
Universally Composable Commitments Using Random Oracles. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
universal composition, cryptographic protocols, commitment, random oracle |
1 | Douglas Wikström |
A Universally Composable Mix-Net. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Shafi Goldwasser, Erez Waisbard |
Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tamir Tassa |
Hierarchical Threshold Secret Sharing. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Iftach Haitner |
Implementing Oblivious Transfer Using Collection of Dense Trapdoor Permutations. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jens Groth |
Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Dwork, Ronen Shaltiel, Adam D. Smith, Luca Trevisan |
List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Cramer, Ivan Damgård |
Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Alon Rosen |
A Note on Constant-Round Zero-Knowledge Proofs for NP. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer, Renato Renner, Clemens Holenstein |
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Tal Malkin |
A Quantitative Approach to Reductions in Secure Computation. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel |
Constant-Round Oblivious Transfer in the Bounded Storage Model. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Claude Crépeau, Paul Dumais, Dominic Mayers, Louis Salvail |
Computational Collapse of Quantum State with Application to Oblivious Transfer. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Mark Johnson, David A. Wagner 0001, Kannan Ramchandran |
On Compressing Encrypted Data without the Encryption Key. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin |
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Philip D. MacKenzie, Michael K. Reiter, Ke Yang |
Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Juan A. Garay |
Efficient and Universally Composable Committed Oblivious Transfer and Applications. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Omer Reingold, Luca Trevisan, Salil P. Vadhan |
Notions of Reducibility between Cryptographic Primitives. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Oded Goldreich 0001, Shai Halevi |
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Micali, Leonid Reyzin |
Physically Observable Cryptography (Extended Abstract). |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|