The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "TCC"( http://dblp.L3S.de/Venues/TCC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/tcc

Publication years (Num. hits)
2004 (29) 2005 (33) 2006 (32) 2007 (32) 2008 (35) 2009 (36) 2010 (36) 2011 (38) 2012 (37) 2013 (42) 2014 (31)
Publication types (Num. hits)
inproceedings(370) proceedings(11)
Venues (Conferences, Journals, ...)
TCC(381)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 58 occurrences of 51 keywords

Results
Found 381 publication records. Showing 381 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Juan A. Garay, Philip D. MacKenzie, Manoj Prabhakaran 0001, Ke Yang Resource Fairness and Composability of Cryptographic Protocols. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hoeteck Wee Finding Pessiland. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil P. Vadhan Concurrent Zero Knowledge Without Complexity Assumptions. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Jonathan Herzog Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek Separating Sources for Encryption and Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chris Peikert On Error Correction in the Exponent. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Matthias Fitzi, Juan A. Garay, Shyamnath Gollakota, C. Pandu Rangan, K. Srinathan Round-Optimal and Efficient Verifiable Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Charanjit S. Jutla PRF Domain Extension Using DAGs. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov Games and the Impossibility of Realizable Ideal Functionality. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zuzana Beerliová-Trubíniová, Martin Hirt Efficient Multi-party Computation with Dispute Control. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Tal Malkin, Ryan Moriarty, Nikolai Yakovenko Generalized Environmental Security from Number Theoretic Assumptions. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Eike Kiltz Chosen-Ciphertext Security from Tag-Based Encryption. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chris Peikert, Alon Rosen Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shai Halevi, Tal Rabin (eds.) Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung Threshold and Proactive Pseudo-Random Permutations. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Distributed Block Ciphers, Distributed Luby-Rackoff Construction, Oblivious Pseudo-Random Functions, Threshold Cryptography
1Vladimir Kolesnikov, Charles Rackoff Key Exchange Using Passwords and Long Keys. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chiu-Yuen Koo Secure Computation with Partial Message Loss. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Richard J. Lipton, Shabsi Walfish Perfectly Secure Password Protocols in the Bounded Retrieval Model. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Nelly Fazio, Antonio Nicolosi Non-interactive Zero-Knowledge from Homomorphic Encryption. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Minh-Huyen Nguyen The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joe Kilian (eds.) Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jens Groth Cryptography in Subgroups of Zn. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Shafi Goldwasser, Dmitriy Kharchenko Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Shai Halevi, Jonathan Katz Adaptively-Secure, Non-interactive Public-Key Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell Upper and Lower Bounds on Black-Box Steganography. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Henry C. Lin, Luca Trevisan, Hoeteck Wee On Hardness Amplification of One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Silvio Micali, Chris Peikert, Madhu Sudan 0001, David A. Wilson Optimal Error Correction Against Computationally Bounded Noise. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan On the Relationships Between Notions of Simulation-Based Security. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Renato Renner, Robert König Universally Composable Privacy Amplification Against Quantum Adversaries. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky Sufficient Conditions for Collision-Resistant Hashing. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF private information-retrieval, homomorphic encryption, Collision-resistant hash functions
1Yevgeniy Dodis, Jonathan Katz Chosen-Ciphertext Security of Multiple Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yan Zong Ding Error Correction in the Bounded Storage Model. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Ivan Damgård, Yuval Ishai Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Moni Naor, Asaf Nussboim, Eran Tromer Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Adam D. Smith Entropic Security and the Encryption of High Entropy Messages. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold Keyword Search and Oblivious Pseudorandom Functions. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Secure keyword search, oblivious pseudorandom functions, secure two-party protocols, private information retrieval, privacy-preserving protocols
1Michael Backes 0001, Christian Cachin Public-Key Steganography with Active Attacks. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Daniele Micciancio, Saurabh Panjwani Adaptive Security of Symbolic Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Susan Hohenberger, Anna Lysyanskaya How to Securely Outsource Cryptographic Computations. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Eike Kiltz, Gregor Leander, John Malone-Lee Secure Computation of the Mean and Related Statistics. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Eu-Jin Goh, Kobbi Nissim Evaluating 2-DNF Formulas on Ciphertexts. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Shai Halevi, Michael Steiner 0001 Hardness Amplification of Weakly Verifiable Puzzles. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Shuchi Chawla 0001, Cynthia Dwork, Frank McSherry, Adam D. Smith, Hoeteck Wee Toward Privacy in Public Databases. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Stanislaw Jarecki, Nitesh Saxena Further Simplifications in Proactive RSA Signatures. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Matt Lepinski, Silvio Micali, Abhi Shelat Fair-Zero Knowledge. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Ben-Or, Michal Horodecki, Debbie W. Leung, Dominic Mayers, Jonathan Oppenheim The Universal Composable Security of Quantum Key Distribution. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dennis Hofheinz, Dominique Unruh Comparing Two Notions of Simulatability. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Tamir Tassa, Enav Weinreb Characterizing Ideal Weighted Threshold Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Yehuda Lindell Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Manoj Prabhakaran 0001, Amit Sahai Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto A Universally Composable Secure Channel Based on the KEM-DEM Framework. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Birgit Pfitzmann, Michael Waidner A General Composition Theorem for Secure Reactive Systems. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Moni Naor (eds.) Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Boaz Barak, Rafael Pass On the Possibility of One-Message Weak Zero-Knowledge. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell Lower Bounds for Concurrent Self Composition. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ronald L. Rivest On the Notion of Pseudo-Free Groups. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Daniele Micciancio, Bogdan Warinschi Soundness of Formal Encryption in the Presence of Active Adversaries. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer, Krzysztof Pietrzak Composition of Random Systems: When Two Weak Make One Strong. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Serge Fehr, Kirill Morozov, Louis Salvail Unfair Noisy Channels and Oblivious Transfer. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Minh-Huyen Nguyen, Salil P. Vadhan Simpler Session-Key Generation from Short Random Passwords. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Dennis Hofheinz, Jörn Müller-Quade Universally Composable Commitments Using Random Oracles. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF universal composition, cryptographic protocols, commitment, random oracle
1Douglas Wikström A Universally Composable Mix-Net. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Shafi Goldwasser, Erez Waisbard Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tamir Tassa Hierarchical Threshold Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Iftach Haitner Implementing Oblivious Transfer Using Collection of Dense Trapdoor Permutations. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jens Groth Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Cynthia Dwork, Ronen Shaltiel, Adam D. Smith, Luca Trevisan List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Ivan Damgård Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Alon Rosen A Note on Constant-Round Zero-Knowledge Proofs for NP. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer, Renato Renner, Clemens Holenstein Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Tal Malkin A Quantitative Approach to Reductions in Secure Computation. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel Constant-Round Oblivious Transfer in the Bounded Storage Model. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Claude Crépeau, Paul Dumais, Dominic Mayers, Louis Salvail Computational Collapse of Quantum State with Application to Oblivious Transfer. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mark Johnson, David A. Wagner 0001, Kannan Ramchandran On Compressing Encrypted Data without the Encryption Key. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Philip D. MacKenzie, Michael K. Reiter, Ke Yang Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Juan A. Garay Efficient and Universally Composable Committed Oblivious Transfer and Applications. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Omer Reingold, Luca Trevisan, Salil P. Vadhan Notions of Reducibility between Cryptographic Primitives. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Oded Goldreich 0001, Shai Halevi On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Silvio Micali, Leonid Reyzin Physically Observable Cryptography (Extended Abstract). Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #381 of 381 (100 per page; Change: )
Pages: [<<][1][2][3][4]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license