default search action
2. TCC 2005: Cambridge, MA, USA
- Joe Kilian:
Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings. Lecture Notes in Computer Science 3378, Springer 2005, ISBN 3-540-24573-1
Hardness Amplification and Error Correction
- Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson:
Optimal Error Correction Against Computationally Bounded Noise. 1-16 - Ran Canetti, Shai Halevi, Michael Steiner:
Hardness Amplification of Weakly Verifiable Puzzles. 17-33 - Henry C. Lin, Luca Trevisan, Hoeteck Wee:
On Hardness Amplification of One-Way Functions. 34-49
Graphs and Groups
- Jens Groth:
Cryptography in Subgroups of Zn. 50-65 - Moni Naor, Asaf Nussboim, Eran Tromer:
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs. 66-85
Simulation and Secure Computation
- Dennis Hofheinz, Dominique Unruh:
Comparing Two Notions of Simulatability. 86-103 - Manoj Prabhakaran, Amit Sahai:
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation. 104-127 - Jonathan Katz, Yehuda Lindell:
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. 128-149
Security of Encryption
- Ran Canetti, Shai Halevi, Jonathan Katz:
Adaptively-Secure, Non-interactive Public-Key Encryption. 150-168 - Daniele Micciancio, Saurabh Panjwani:
Adaptive Security of Symbolic Encryption. 169-187 - Yevgeniy Dodis, Jonathan Katz:
Chosen-Ciphertext Security of Multiple Encryption. 188-209
Steganography and Zero Knowledge
- Michael Backes, Christian Cachin:
Public-Key Steganography with Active Attacks. 210-226 - Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell:
Upper and Lower Bounds on Black-Box Steganography. 227-244 - Matt Lepinski, Silvio Micali, Abhi Shelat:
Fair-Zero Knowledge. 245-263
Secure Computation I
- Susan Hohenberger, Anna Lysyanskaya:
How to Securely Outsource Cryptographic Computations. 264-282 - Eike Kiltz, Gregor Leander, John Malone-Lee:
Secure Computation of the Mean and Related Statistics. 283-302 - Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold:
Keyword Search and Oblivious Pseudorandom Functions. 303-324
Secure Computation II
- Dan Boneh, Eu-Jin Goh, Kobbi Nissim:
Evaluating 2-DNF Formulas on Ciphertexts. 325-341 - Ronald Cramer, Ivan Damgård, Yuval Ishai:
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. 342-362 - Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam D. Smith, Hoeteck Wee:
Toward Privacy in Public Databases. 363-385
Quantum Cryptography and Universal Composability
- Michael Ben-Or, Michal Horodecki, Debbie W. Leung, Dominic Mayers, Jonathan Oppenheim:
The Universal Composable Security of Quantum Key Distribution. 386-406 - Renato Renner, Robert König:
Universally Composable Privacy Amplification Against Quantum Adversaries. 407-425 - Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
A Universally Composable Secure Channel Based on the KEM-DEM Framework. 426-444
Cryptographic Primitives and Security
- Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky:
Sufficient Conditions for Collision-Resistant Hashing. 445-456 - Minh-Huyen Nguyen:
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives. 457-475 - Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security. 476-494
Encryption and Signatures
- María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar:
A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. 495-509 - Stanislaw Jarecki, Nitesh Saxena:
Further Simplifications in Proactive RSA Signatures. 510-528 - Shafi Goldwasser, Dmitriy Kharchenko:
Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem. 529-555
Information Theoretic Cryptography
- Yevgeniy Dodis, Adam D. Smith:
Entropic Security and the Encryption of High Entropy Messages. 556-577 - Yan Zong Ding:
Error Correction in the Bounded Storage Model. 578-599 - Amos Beimel, Tamir Tassa, Enav Weinreb:
Characterizing Ideal Weighted Threshold Secret Sharing. 600-619
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.