Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/tcc/tcc2009.bht:"
@inproceedings{DBLP:conf/tcc/AkaviaGV09, author = {Adi Akavia and Shafi Goldwasser and Vinod Vaikuntanathan}, editor = {Omer Reingold}, title = {Simultaneous Hardcore Bits and Cryptography against Memory Attacks}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {474--495}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_28}, doi = {10.1007/978-3-642-00457-5\_28}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AkaviaGV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AmirBO09, author = {Yair Amir and Paul Bunn and Rafail Ostrovsky}, editor = {Omer Reingold}, title = {Authenticated Adversarial Routing}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {163--182}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_11}, doi = {10.1007/978-3-642-00457-5\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AmirBO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BeimelO09, author = {Amos Beimel and Ilan Orlov}, editor = {Omer Reingold}, title = {Secret Sharing and Non-Shannon Information Inequalities}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {539--557}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_32}, doi = {10.1007/978-3-642-00457-5\_32}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BeimelO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiGRV09, author = {Zvika Brakerski and Shafi Goldwasser and Guy N. Rothblum and Vinod Vaikuntanathan}, editor = {Omer Reingold}, title = {Weak Verifiable Random Functions}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {558--576}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_33}, doi = {10.1007/978-3-642-00457-5\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiGRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiD09, author = {Ran Canetti and Ronny Ramzi Dakdouk}, editor = {Omer Reingold}, title = {Towards a Theory of Extractable Functions}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {595--613}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_35}, doi = {10.1007/978-3-642-00457-5\_35}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiV09, author = {Ran Canetti and Mayank Varia}, editor = {Omer Reingold}, title = {Non-malleable Obfuscation}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {73--90}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_6}, doi = {10.1007/978-3-642-00457-5\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChoiDMW09, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, editor = {Omer Reingold}, title = {Simple, Black-Box Constructions of Adaptively Secure Protocols}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {387--402}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_23}, doi = {10.1007/978-3-642-00457-5\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChoiDMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CookEMT09, author = {James Cook and Omid Etesami and Rachel Miller and Luca Trevisan}, editor = {Omer Reingold}, title = {Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {521--538}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_31}, doi = {10.1007/978-3-642-00457-5\_31}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/CookEMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardNW09, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Daniel Wichs}, editor = {Omer Reingold}, title = {Universally Composable Multiparty Computation with Partially Isolated Parties}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {315--331}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_19}, doi = {10.1007/978-3-642-00457-5\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisIJK09, author = {Yevgeniy Dodis and Russell Impagliazzo and Ragesh Jaiswal and Valentine Kabanets}, editor = {Omer Reingold}, title = {Security Amplification for InteractiveCryptographic Primitives}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {128--145}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_9}, doi = {10.1007/978-3-642-00457-5\_9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisIJK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisKSW09, author = {Yevgeniy Dodis and Jonathan Katz and Adam D. Smith and Shabsi Walfish}, editor = {Omer Reingold}, title = {Composability and On-Line Deniability of Authentication}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {146--162}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_10}, doi = {10.1007/978-3-642-00457-5\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisKSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisVW09, author = {Yevgeniy Dodis and Salil P. Vadhan and Daniel Wichs}, editor = {Omer Reingold}, title = {Proofs of Retrievability via Hardness Amplification}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {109--127}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_8}, doi = {10.1007/978-3-642-00457-5\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisVW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dwork09, author = {Cynthia Dwork}, editor = {Omer Reingold}, title = {The Differential Privacy Frontier (Extended Abstract)}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {496--502}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_29}, doi = {10.1007/978-3-642-00457-5\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Dwork09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DworkNRV09, author = {Cynthia Dwork and Moni Naor and Guy N. Rothblum and Vinod Vaikuntanathan}, editor = {Omer Reingold}, title = {How Efficient Can Memory Checking Be?}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {503--520}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_30}, doi = {10.1007/978-3-642-00457-5\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DworkNRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FehrS09, author = {Serge Fehr and Christian Schaffner}, editor = {Omer Reingold}, title = {Composing Quantum Protocols in a Classical Environment}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {350--367}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_21}, doi = {10.1007/978-3-642-00457-5\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FehrS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GentryH09, author = {Craig Gentry and Shai Halevi}, editor = {Omer Reingold}, title = {Hierarchical Identity Based Encryption with Polynomially Many Levels}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {437--456}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_26}, doi = {10.1007/978-3-642-00457-5\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GentryH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GordonK09, author = {S. Dov Gordon and Jonathan Katz}, editor = {Omer Reingold}, title = {Complete Fairness in Multi-party Computation without an Honest Majority}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {19--35}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_2}, doi = {10.1007/978-3-642-00457-5\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GordonK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaitnerH09, author = {Iftach Haitner and Thomas Holenstein}, editor = {Omer Reingold}, title = {On the (Im)Possibility of Key Dependent Encryption}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {202--219}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_13}, doi = {10.1007/978-3-642-00457-5\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HaitnerH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaitnerRS09, author = {Iftach Haitner and Alon Rosen and Ronen Shaltiel}, editor = {Omer Reingold}, title = {On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {220--237}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_14}, doi = {10.1007/978-3-642-00457-5\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HaitnerRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiPS09, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai}, editor = {Omer Reingold}, title = {Secure Arithmetic Computation with No Honest Majority}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {294--314}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_18}, doi = {10.1007/978-3-642-00457-5\_18}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/IshaiPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JareckiL09, author = {Stanislaw Jarecki and Xiaomin Liu}, editor = {Omer Reingold}, title = {Efficient Oblivious Pseudorandom Function with Applications to Adaptive {OT} and Secure Computation of Set Intersection}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {577--594}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_34}, doi = {10.1007/978-3-642-00457-5\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/JareckiL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KunzlerMR09, author = {Robin K{\"{u}}nzler and J{\"{o}}rn M{\"{u}}ller{-}Quade and Dominik Raub}, editor = {Omer Reingold}, title = {Secure Computability of Functions in the {IT} Setting with Dishonest Majority and Applications to Long-Term Security}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {238--255}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_15}, doi = {10.1007/978-3-642-00457-5\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KunzlerMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LindellZ09, author = {Yehuda Lindell and Hila Zarosim}, editor = {Omer Reingold}, title = {Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {183--201}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_12}, doi = {10.1007/978-3-642-00457-5\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/LindellZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MajiPR09, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, editor = {Omer Reingold}, title = {Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {256--273}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_16}, doi = {10.1007/978-3-642-00457-5\_16}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MajiPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MicaliS09, author = {Silvio Micali and Abhi Shelat}, editor = {Omer Reingold}, title = {Purely Rational Secret Sharing (Extended Abstract)}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {54--71}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_4}, doi = {10.1007/978-3-642-00457-5\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MicaliS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MoranNS09, author = {Tal Moran and Moni Naor and Gil Segev}, editor = {Omer Reingold}, title = {An Optimally Fair Coin Toss}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {1--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_1}, doi = {10.1007/978-3-642-00457-5\_1}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MoranNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/NielsenO09, author = {Jesper Buus Nielsen and Claudio Orlandi}, editor = {Omer Reingold}, title = {{LEGO} for Two-Party Secure Computation}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {368--386}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_22}, doi = {10.1007/978-3-642-00457-5\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/NielsenO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/OngPRV09, author = {Shien Jin Ong and David C. Parkes and Alon Rosen and Salil P. Vadhan}, editor = {Omer Reingold}, title = {Fairness with an Honest Minority and a Rational Majority}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {36--53}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_3}, doi = {10.1007/978-3-642-00457-5\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/OngPRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/OstrovskyPV09, author = {Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti}, editor = {Omer Reingold}, title = {Simulation-Based Concurrent Non-malleable Commitments and Decommitments}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {91--108}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_7}, doi = {10.1007/978-3-642-00457-5\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/OstrovskyPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PassW09, author = {Rafael Pass and Hoeteck Wee}, editor = {Omer Reingold}, title = {Black-Box Constructions of Two-Party Protocols from One-Way Functions}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {403--418}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_24}, doi = {10.1007/978-3-642-00457-5\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PassW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Peikert09, author = {Chris Peikert}, editor = {Omer Reingold}, title = {Some Recent Progress in Lattice-Based Cryptography}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {72}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_5}, doi = {10.1007/978-3-642-00457-5\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Peikert09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/RosenS09, author = {Alon Rosen and Gil Segev}, editor = {Omer Reingold}, title = {Chosen-Ciphertext Security via Correlated Products}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {419--436}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_25}, doi = {10.1007/978-3-642-00457-5\_25}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/RosenS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ShenSW09, author = {Emily Shen and Elaine Shi and Brent Waters}, editor = {Omer Reingold}, title = {Predicate Privacy in Encryption Systems}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {457--473}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_27}, doi = {10.1007/978-3-642-00457-5\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ShenSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Wullschleger09, author = {J{\"{u}}rg Wullschleger}, editor = {Omer Reingold}, title = {Oblivious Transfer from Weak Noisy Channels}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {332--349}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_20}, doi = {10.1007/978-3-642-00457-5\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Wullschleger09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ZikasHM09, author = {Vassilis Zikas and Sarah Hauser and Ueli M. Maurer}, editor = {Omer Reingold}, title = {Realistic Failures in Secure Multi-party Computation}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {274--293}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_17}, doi = {10.1007/978-3-642-00457-5\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ZikasHM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2009, editor = {Omer Reingold}, title = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5}, doi = {10.1007/978-3-642-00457-5}, isbn = {978-3-642-00456-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.