Search dblp for Publications

export results for "toc:db/conf/tcc/tcc2015-1.bht:"

 download as .bib file

@inproceedings{DBLP:conf/tcc/0002H15,
  author       = {Takahiro Matsuda and
                  Goichiro Hanaoka},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Constructing and Understanding Chosen Ciphertext Security via Puncturable
                  Key Encapsulation Mechanisms},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {561--590},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_23},
  doi          = {10.1007/978-3-662-46494-6\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/0002H15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AggarwalDKO15,
  author       = {Divesh Aggarwal and
                  Stefan Dziembowski and
                  Tomasz Kazana and
                  Maciej Obremski},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Leakage-Resilient Non-malleable Codes},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {398--426},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_17},
  doi          = {10.1007/978-3-662-46494-6\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AggarwalDKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Agrawal0MPP15,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise
                  Tampering and Permutations},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {375--397},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_16},
  doi          = {10.1007/978-3-662-46494-6\_16},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Agrawal0MPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AsharovBMO15,
  author       = {Gilad Asharov and
                  Amos Beimel and
                  Nikolaos Makriyannis and
                  Eran Omri},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Complete Characterization of Fairness in Secure Two-Party Computation
                  of Boolean Functions},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {199--228},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_10},
  doi          = {10.1007/978-3-662-46494-6\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AsharovBMO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BaderHJKL15,
  author       = {Christoph Bader and
                  Dennis Hofheinz and
                  Tibor Jager and
                  Eike Kiltz and
                  Yong Li},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Tightly-Secure Authenticated Key Exchange},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {629--658},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_26},
  doi          = {10.1007/978-3-662-46494-6\_26},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BaderHJKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BogdanovB15,
  author       = {Andrej Bogdanov and
                  Christina Brzuska},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {On Basing Size-Verifiable One-Way Functions on NP-Hardness},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {1--6},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_1},
  doi          = {10.1007/978-3-662-46494-6\_1},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BogdanovB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChungLP15,
  author       = {Kai{-}Min Chung and
                  Edward Lui and
                  Rafael Pass},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {From Weak to Strong Zero-Knowledge and Applications},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {66--92},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_4},
  doi          = {10.1007/978-3-662-46494-6\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChungLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CorettiMTV15,
  author       = {Sandro Coretti and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable
                  Codes},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {532--560},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_22},
  doi          = {10.1007/978-3-662-46494-6\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CorettiMTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CramerPX15,
  author       = {Ronald Cramer and
                  Carles Padr{\'{o}} and
                  Chaoping Xing},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Optimal Algebraic Manipulation Detection Codes in the Constant-Error
                  Model},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {481--501},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_20},
  doi          = {10.1007/978-3-662-46494-6\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CramerPX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledLS15,
  author       = {Dana Dachman{-}Soled and
                  Feng{-}Hao Liu and
                  Elaine Shi and
                  Hong{-}Sheng Zhou},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Locally Decodable and Updatable Non-malleable Codes and Their Applications},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {427--450},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_18},
  doi          = {10.1007/978-3-662-46494-6\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DottlingKMN15,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {General Statistically Secure Computation with Bounded-Resettable Hardware
                  Tokens},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {319--344},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_14},
  doi          = {10.1007/978-3-662-46494-6\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DottlingKMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FischFN15,
  author       = {Ben A. Fisch and
                  Daniel Freund and
                  Moni Naor},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Secure Physical Computation Using Disposable Circuits},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {182--198},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_9},
  doi          = {10.1007/978-3-662-46494-6\_9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FischFN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GarayGJKY15,
  author       = {Juan A. Garay and
                  Ran Gelles and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty
                  Computation},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {134--158},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_7},
  doi          = {10.1007/978-3-662-46494-6\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GarayGJKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalLPPS15,
  author       = {Vipul Goyal and
                  Huijia Lin and
                  Omkant Pandey and
                  Rafael Pass and
                  Amit Sahai},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Round-Efficient Concurrently Composable Secure Computation via a Robust
                  Extraction Lemma},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {260--289},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_12},
  doi          = {10.1007/978-3-662-46494-6\_12},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalLPPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GuoL15,
  author       = {Chun Guo and
                  Dongdai Lin},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {On the Indifferentiability of Key-Alternating Feistel Ciphers with
                  No Key Derivation},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {110--133},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_6},
  doi          = {10.1007/978-3-662-46494-6\_6},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GuoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GuoMOR15,
  author       = {Siyao Guo and
                  Tal Malkin and
                  Igor C. Oliveira and
                  Alon Rosen},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {The Power of Negations in Cryptography},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {36--65},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_3},
  doi          = {10.1007/978-3-662-46494-6\_3},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GuoMOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HemenwayOR15,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky and
                  Alon Rosen},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Non-committing Encryption from {\(\Phi\)}-hiding},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {591--608},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_24},
  doi          = {10.1007/978-3-662-46494-6\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HemenwayOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JafargholiW15,
  author       = {Zahra Jafargholi and
                  Daniel Wichs},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Tamper Detection and Continuous Non-malleable Codes},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {451--480},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_19},
  doi          = {10.1007/978-3-662-46494-6\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/JafargholiW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Kiyoshima15,
  author       = {Susumu Kiyoshima},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {An Alternative Approach to Non-black-box Simulation in Fully Concurrent
                  Setting},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {290--318},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_13},
  doi          = {10.1007/978-3-662-46494-6\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Kiyoshima15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KolesnikovMRR15,
  author       = {Vladimir Kolesnikov and
                  Payman Mohassel and
                  Ben Riva and
                  Mike Rosulek},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Richer Efficiency/Security Trade-offs in 2PC},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {229--259},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_11},
  doi          = {10.1007/978-3-662-46494-6\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KolesnikovMRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Li15,
  author       = {Xin Li},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Non-malleable Condensers for Arbitrary Min-entropy, and Almost Optimal
                  Protocols for Privacy Amplification},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {502--531},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_21},
  doi          = {10.1007/978-3-662-46494-6\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Li15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Lindell15,
  author       = {Yehuda Lindell},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {An Efficient Transform from Sigma Protocols to {NIZK} with a {CRS}
                  and Non-programmable Random Oracle},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {93--109},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_5},
  doi          = {10.1007/978-3-662-46494-6\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Lindell15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MoranOR15,
  author       = {Tal Moran and
                  Ilan Orlov and
                  Silas Richelson},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Topology-Hiding Computation},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {159--181},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_8},
  doi          = {10.1007/978-3-662-46494-6\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MoranOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/OstrovskySV15,
  author       = {Rafail Ostrovsky and
                  Alessandra Scafuro and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box
                  Way},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {345--374},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_15},
  doi          = {10.1007/978-3-662-46494-6\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/OstrovskySV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/SmithZ15,
  author       = {Adam D. Smith and
                  Ye Zhang},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {On the Regularity of Lossy {RSA} - Improved Bounds and Applications
                  to Padding-Based Encryption},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {609--628},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_25},
  doi          = {10.1007/978-3-662-46494-6\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/SmithZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/YuGLW15,
  author       = {Yu Yu and
                  Dawu Gu and
                  Xiangxue Li and
                  Jian Weng},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs
                  from a Broader Class of One-Way Functions},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {7--35},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_2},
  doi          = {10.1007/978-3-662-46494-6\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/YuGLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2015-1,
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6},
  doi          = {10.1007/978-3-662-46494-6},
  isbn         = {978-3-662-46493-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2015-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics