Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/tcc/tcc2015-1.bht:"
@inproceedings{DBLP:conf/tcc/0002H15, author = {Takahiro Matsuda and Goichiro Hanaoka}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {561--590}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_23}, doi = {10.1007/978-3-662-46494-6\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/0002H15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AggarwalDKO15, author = {Divesh Aggarwal and Stefan Dziembowski and Tomasz Kazana and Maciej Obremski}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Leakage-Resilient Non-malleable Codes}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {398--426}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_17}, doi = {10.1007/978-3-662-46494-6\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AggarwalDKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Agrawal0MPP15, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {375--397}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_16}, doi = {10.1007/978-3-662-46494-6\_16}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Agrawal0MPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AsharovBMO15, author = {Gilad Asharov and Amos Beimel and Nikolaos Makriyannis and Eran Omri}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {199--228}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_10}, doi = {10.1007/978-3-662-46494-6\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AsharovBMO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BaderHJKL15, author = {Christoph Bader and Dennis Hofheinz and Tibor Jager and Eike Kiltz and Yong Li}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Tightly-Secure Authenticated Key Exchange}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {629--658}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_26}, doi = {10.1007/978-3-662-46494-6\_26}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BaderHJKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BogdanovB15, author = {Andrej Bogdanov and Christina Brzuska}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {On Basing Size-Verifiable One-Way Functions on NP-Hardness}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {1--6}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_1}, doi = {10.1007/978-3-662-46494-6\_1}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BogdanovB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChungLP15, author = {Kai{-}Min Chung and Edward Lui and Rafael Pass}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {From Weak to Strong Zero-Knowledge and Applications}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {66--92}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_4}, doi = {10.1007/978-3-662-46494-6\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChungLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CorettiMTV15, author = {Sandro Coretti and Ueli Maurer and Bj{\"{o}}rn Tackmann and Daniele Venturi}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {532--560}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_22}, doi = {10.1007/978-3-662-46494-6\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CorettiMTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CramerPX15, author = {Ronald Cramer and Carles Padr{\'{o}} and Chaoping Xing}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {481--501}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_20}, doi = {10.1007/978-3-662-46494-6\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CramerPX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledLS15, author = {Dana Dachman{-}Soled and Feng{-}Hao Liu and Elaine Shi and Hong{-}Sheng Zhou}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Locally Decodable and Updatable Non-malleable Codes and Their Applications}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {427--450}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_18}, doi = {10.1007/978-3-662-46494-6\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DottlingKMN15, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {General Statistically Secure Computation with Bounded-Resettable Hardware Tokens}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {319--344}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_14}, doi = {10.1007/978-3-662-46494-6\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DottlingKMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FischFN15, author = {Ben A. Fisch and Daniel Freund and Moni Naor}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Secure Physical Computation Using Disposable Circuits}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {182--198}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_9}, doi = {10.1007/978-3-662-46494-6\_9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FischFN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GarayGJKY15, author = {Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {134--158}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_7}, doi = {10.1007/978-3-662-46494-6\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GarayGJKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalLPPS15, author = {Vipul Goyal and Huijia Lin and Omkant Pandey and Rafael Pass and Amit Sahai}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {260--289}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_12}, doi = {10.1007/978-3-662-46494-6\_12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoyalLPPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GuoL15, author = {Chun Guo and Dongdai Lin}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {110--133}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_6}, doi = {10.1007/978-3-662-46494-6\_6}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GuoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GuoMOR15, author = {Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {The Power of Negations in Cryptography}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {36--65}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_3}, doi = {10.1007/978-3-662-46494-6\_3}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GuoMOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HemenwayOR15, author = {Brett Hemenway and Rafail Ostrovsky and Alon Rosen}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Non-committing Encryption from {\(\Phi\)}-hiding}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {591--608}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_24}, doi = {10.1007/978-3-662-46494-6\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HemenwayOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JafargholiW15, author = {Zahra Jafargholi and Daniel Wichs}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Tamper Detection and Continuous Non-malleable Codes}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {451--480}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_19}, doi = {10.1007/978-3-662-46494-6\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/JafargholiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Kiyoshima15, author = {Susumu Kiyoshima}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {290--318}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_13}, doi = {10.1007/978-3-662-46494-6\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Kiyoshima15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KolesnikovMRR15, author = {Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Richer Efficiency/Security Trade-offs in 2PC}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {229--259}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_11}, doi = {10.1007/978-3-662-46494-6\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KolesnikovMRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Li15, author = {Xin Li}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Non-malleable Condensers for Arbitrary Min-entropy, and Almost Optimal Protocols for Privacy Amplification}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {502--531}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_21}, doi = {10.1007/978-3-662-46494-6\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Li15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Lindell15, author = {Yehuda Lindell}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {An Efficient Transform from Sigma Protocols to {NIZK} with a {CRS} and Non-programmable Random Oracle}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {93--109}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_5}, doi = {10.1007/978-3-662-46494-6\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Lindell15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MoranOR15, author = {Tal Moran and Ilan Orlov and Silas Richelson}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Topology-Hiding Computation}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {159--181}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_8}, doi = {10.1007/978-3-662-46494-6\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MoranOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/OstrovskySV15, author = {Rafail Ostrovsky and Alessandra Scafuro and Muthuramakrishnan Venkitasubramaniam}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {345--374}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_15}, doi = {10.1007/978-3-662-46494-6\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/OstrovskySV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/SmithZ15, author = {Adam D. Smith and Ye Zhang}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {On the Regularity of Lossy {RSA} - Improved Bounds and Applications to Padding-Based Encryption}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {609--628}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_25}, doi = {10.1007/978-3-662-46494-6\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/SmithZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/YuGLW15, author = {Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {7--35}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_2}, doi = {10.1007/978-3-662-46494-6\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/YuGLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2015-1, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6}, doi = {10.1007/978-3-662-46494-6}, isbn = {978-3-662-46493-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.