Search dblp for Publications

export results for "toc:db/conf/tcc/tcc2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/tcc/AkaviaGV09,
  author       = {Adi Akavia and
                  Shafi Goldwasser and
                  Vinod Vaikuntanathan},
  editor       = {Omer Reingold},
  title        = {Simultaneous Hardcore Bits and Cryptography against Memory Attacks},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {474--495},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_28},
  doi          = {10.1007/978-3-642-00457-5\_28},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AkaviaGV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AmirBO09,
  author       = {Yair Amir and
                  Paul Bunn and
                  Rafail Ostrovsky},
  editor       = {Omer Reingold},
  title        = {Authenticated Adversarial Routing},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {163--182},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_11},
  doi          = {10.1007/978-3-642-00457-5\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AmirBO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BeimelO09,
  author       = {Amos Beimel and
                  Ilan Orlov},
  editor       = {Omer Reingold},
  title        = {Secret Sharing and Non-Shannon Information Inequalities},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {539--557},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_32},
  doi          = {10.1007/978-3-642-00457-5\_32},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BeimelO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiGRV09,
  author       = {Zvika Brakerski and
                  Shafi Goldwasser and
                  Guy N. Rothblum and
                  Vinod Vaikuntanathan},
  editor       = {Omer Reingold},
  title        = {Weak Verifiable Random Functions},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {558--576},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_33},
  doi          = {10.1007/978-3-642-00457-5\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiGRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiD09,
  author       = {Ran Canetti and
                  Ronny Ramzi Dakdouk},
  editor       = {Omer Reingold},
  title        = {Towards a Theory of Extractable Functions},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {595--613},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_35},
  doi          = {10.1007/978-3-642-00457-5\_35},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiV09,
  author       = {Ran Canetti and
                  Mayank Varia},
  editor       = {Omer Reingold},
  title        = {Non-malleable Obfuscation},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_6},
  doi          = {10.1007/978-3-642-00457-5\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChoiDMW09,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  editor       = {Omer Reingold},
  title        = {Simple, Black-Box Constructions of Adaptively Secure Protocols},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {387--402},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_23},
  doi          = {10.1007/978-3-642-00457-5\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChoiDMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CookEMT09,
  author       = {James Cook and
                  Omid Etesami and
                  Rachel Miller and
                  Luca Trevisan},
  editor       = {Omer Reingold},
  title        = {Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {521--538},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_31},
  doi          = {10.1007/978-3-642-00457-5\_31},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/CookEMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardNW09,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Daniel Wichs},
  editor       = {Omer Reingold},
  title        = {Universally Composable Multiparty Computation with Partially Isolated
                  Parties},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {315--331},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_19},
  doi          = {10.1007/978-3-642-00457-5\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisIJK09,
  author       = {Yevgeniy Dodis and
                  Russell Impagliazzo and
                  Ragesh Jaiswal and
                  Valentine Kabanets},
  editor       = {Omer Reingold},
  title        = {Security Amplification for InteractiveCryptographic Primitives},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {128--145},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_9},
  doi          = {10.1007/978-3-642-00457-5\_9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisIJK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisKSW09,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Adam D. Smith and
                  Shabsi Walfish},
  editor       = {Omer Reingold},
  title        = {Composability and On-Line Deniability of Authentication},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {146--162},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_10},
  doi          = {10.1007/978-3-642-00457-5\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisKSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisVW09,
  author       = {Yevgeniy Dodis and
                  Salil P. Vadhan and
                  Daniel Wichs},
  editor       = {Omer Reingold},
  title        = {Proofs of Retrievability via Hardness Amplification},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {109--127},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_8},
  doi          = {10.1007/978-3-642-00457-5\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisVW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dwork09,
  author       = {Cynthia Dwork},
  editor       = {Omer Reingold},
  title        = {The Differential Privacy Frontier (Extended Abstract)},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {496--502},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_29},
  doi          = {10.1007/978-3-642-00457-5\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Dwork09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DworkNRV09,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Guy N. Rothblum and
                  Vinod Vaikuntanathan},
  editor       = {Omer Reingold},
  title        = {How Efficient Can Memory Checking Be?},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {503--520},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_30},
  doi          = {10.1007/978-3-642-00457-5\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DworkNRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FehrS09,
  author       = {Serge Fehr and
                  Christian Schaffner},
  editor       = {Omer Reingold},
  title        = {Composing Quantum Protocols in a Classical Environment},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {350--367},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_21},
  doi          = {10.1007/978-3-642-00457-5\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FehrS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GentryH09,
  author       = {Craig Gentry and
                  Shai Halevi},
  editor       = {Omer Reingold},
  title        = {Hierarchical Identity Based Encryption with Polynomially Many Levels},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {437--456},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_26},
  doi          = {10.1007/978-3-642-00457-5\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GentryH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GordonK09,
  author       = {S. Dov Gordon and
                  Jonathan Katz},
  editor       = {Omer Reingold},
  title        = {Complete Fairness in Multi-party Computation without an Honest Majority},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_2},
  doi          = {10.1007/978-3-642-00457-5\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GordonK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaitnerH09,
  author       = {Iftach Haitner and
                  Thomas Holenstein},
  editor       = {Omer Reingold},
  title        = {On the (Im)Possibility of Key Dependent Encryption},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {202--219},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_13},
  doi          = {10.1007/978-3-642-00457-5\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HaitnerH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaitnerRS09,
  author       = {Iftach Haitner and
                  Alon Rosen and
                  Ronen Shaltiel},
  editor       = {Omer Reingold},
  title        = {On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {220--237},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_14},
  doi          = {10.1007/978-3-642-00457-5\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HaitnerRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiPS09,
  author       = {Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai},
  editor       = {Omer Reingold},
  title        = {Secure Arithmetic Computation with No Honest Majority},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {294--314},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_18},
  doi          = {10.1007/978-3-642-00457-5\_18},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JareckiL09,
  author       = {Stanislaw Jarecki and
                  Xiaomin Liu},
  editor       = {Omer Reingold},
  title        = {Efficient Oblivious Pseudorandom Function with Applications to Adaptive
                  {OT} and Secure Computation of Set Intersection},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {577--594},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_34},
  doi          = {10.1007/978-3-642-00457-5\_34},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/JareckiL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KunzlerMR09,
  author       = {Robin K{\"{u}}nzler and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominik Raub},
  editor       = {Omer Reingold},
  title        = {Secure Computability of Functions in the {IT} Setting with Dishonest
                  Majority and Applications to Long-Term Security},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {238--255},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_15},
  doi          = {10.1007/978-3-642-00457-5\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KunzlerMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LindellZ09,
  author       = {Yehuda Lindell and
                  Hila Zarosim},
  editor       = {Omer Reingold},
  title        = {Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {183--201},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_12},
  doi          = {10.1007/978-3-642-00457-5\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/LindellZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MajiPR09,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Omer Reingold},
  title        = {Complexity of Multi-party Computation Problems: The Case of 2-Party
                  Symmetric Secure Function Evaluation},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {256--273},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_16},
  doi          = {10.1007/978-3-642-00457-5\_16},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MajiPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MicaliS09,
  author       = {Silvio Micali and
                  Abhi Shelat},
  editor       = {Omer Reingold},
  title        = {Purely Rational Secret Sharing (Extended Abstract)},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {54--71},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_4},
  doi          = {10.1007/978-3-642-00457-5\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MicaliS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MoranNS09,
  author       = {Tal Moran and
                  Moni Naor and
                  Gil Segev},
  editor       = {Omer Reingold},
  title        = {An Optimally Fair Coin Toss},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_1},
  doi          = {10.1007/978-3-642-00457-5\_1},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MoranNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/NielsenO09,
  author       = {Jesper Buus Nielsen and
                  Claudio Orlandi},
  editor       = {Omer Reingold},
  title        = {{LEGO} for Two-Party Secure Computation},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {368--386},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_22},
  doi          = {10.1007/978-3-642-00457-5\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/NielsenO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/OngPRV09,
  author       = {Shien Jin Ong and
                  David C. Parkes and
                  Alon Rosen and
                  Salil P. Vadhan},
  editor       = {Omer Reingold},
  title        = {Fairness with an Honest Minority and a Rational Majority},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {36--53},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_3},
  doi          = {10.1007/978-3-642-00457-5\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/OngPRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/OstrovskyPV09,
  author       = {Rafail Ostrovsky and
                  Giuseppe Persiano and
                  Ivan Visconti},
  editor       = {Omer Reingold},
  title        = {Simulation-Based Concurrent Non-malleable Commitments and Decommitments},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_7},
  doi          = {10.1007/978-3-642-00457-5\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/OstrovskyPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PassW09,
  author       = {Rafael Pass and
                  Hoeteck Wee},
  editor       = {Omer Reingold},
  title        = {Black-Box Constructions of Two-Party Protocols from One-Way Functions},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {403--418},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_24},
  doi          = {10.1007/978-3-642-00457-5\_24},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PassW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Peikert09,
  author       = {Chris Peikert},
  editor       = {Omer Reingold},
  title        = {Some Recent Progress in Lattice-Based Cryptography},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {72},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_5},
  doi          = {10.1007/978-3-642-00457-5\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Peikert09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/RosenS09,
  author       = {Alon Rosen and
                  Gil Segev},
  editor       = {Omer Reingold},
  title        = {Chosen-Ciphertext Security via Correlated Products},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {419--436},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_25},
  doi          = {10.1007/978-3-642-00457-5\_25},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/RosenS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ShenSW09,
  author       = {Emily Shen and
                  Elaine Shi and
                  Brent Waters},
  editor       = {Omer Reingold},
  title        = {Predicate Privacy in Encryption Systems},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {457--473},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_27},
  doi          = {10.1007/978-3-642-00457-5\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ShenSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Wullschleger09,
  author       = {J{\"{u}}rg Wullschleger},
  editor       = {Omer Reingold},
  title        = {Oblivious Transfer from Weak Noisy Channels},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {332--349},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_20},
  doi          = {10.1007/978-3-642-00457-5\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Wullschleger09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ZikasHM09,
  author       = {Vassilis Zikas and
                  Sarah Hauser and
                  Ueli M. Maurer},
  editor       = {Omer Reingold},
  title        = {Realistic Failures in Secure Multi-party Computation},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {274--293},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_17},
  doi          = {10.1007/978-3-642-00457-5\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ZikasHM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2009,
  editor       = {Omer Reingold},
  title        = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5},
  doi          = {10.1007/978-3-642-00457-5},
  isbn         = {978-3-642-00456-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics