Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/tcc/tcc2016b2.bht:"
@inproceedings{DBLP:conf/tcc/AgrawalPY16, author = {Shashank Agrawal and Manoj Prabhakaran and Ching{-}Hua Yu}, editor = {Martin Hirt and Adam D. Smith}, title = {Virtual Grey-Boxes Beyond Obfuscation: {A} Statistical Security Notion for Cryptographic Agents}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {269--296}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_11}, doi = {10.1007/978-3-662-53644-5\_11}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AnanthCCLL16, author = {Prabhanjan Ananth and Yu{-}Chi Chen and Kai{-}Min Chung and Huijia Lin and Wei{-}Kai Lin}, editor = {Martin Hirt and Adam D. Smith}, title = {Delegating {RAM} Computations with Adaptive Soundness and Privacy}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {3--30}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_1}, doi = {10.1007/978-3-662-53644-5\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AnanthCCLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AponFL16, author = {Daniel Apon and Xiong Fan and Feng{-}Hao Liu}, editor = {Martin Hirt and Adam D. Smith}, title = {Deniable Attribute Based Encryption for Branching Programs from {LWE}}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {299--329}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_12}, doi = {10.1007/978-3-662-53644-5\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AponFL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Ben-SassonCS16, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Nicholas Spooner}, editor = {Martin Hirt and Adam D. Smith}, title = {Interactive Oracle Proofs}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {31--60}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_2}, doi = {10.1007/978-3-662-53644-5\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Ben-SassonCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BitanskyNPW16, author = {Nir Bitansky and Ryo Nishimaki and Alain Passel{\`{e}}gue and Daniel Wichs}, editor = {Martin Hirt and Adam D. Smith}, title = {From Cryptomania to Obfustopia Through Secret-Key Functional Encryption}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {391--418}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_15}, doi = {10.1007/978-3-662-53644-5\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BitanskyNPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BlockiZ16, author = {Jeremiah Blocki and Hong{-}Sheng Zhou}, editor = {Martin Hirt and Adam D. Smith}, title = {Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {517--546}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_20}, doi = {10.1007/978-3-662-53644-5\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BlockiZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BogdanovGK16, author = {Andrej Bogdanov and Siyao Guo and Ilan Komargodski}, editor = {Martin Hirt and Adam D. Smith}, title = {Threshold Secret Sharing Requires a Linear Size Alphabet}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {471--484}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_18}, doi = {10.1007/978-3-662-53644-5\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BogdanovGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiCTW16, author = {Zvika Brakerski and David Cash and Rotem Tsabary and Hoeteck Wee}, editor = {Martin Hirt and Adam D. Smith}, title = {Targeted Homomorphic Attribute-Based Encryption}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {330--360}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_13}, doi = {10.1007/978-3-662-53644-5\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiCTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiCHR16, author = {Ran Canetti and Yilei Chen and Justin Holmgren and Mariana Raykova}, editor = {Martin Hirt and Adam D. Smith}, title = {Adaptive Succinct Garbled {RAM} or: How to Delegate Your Database}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {61--90}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_3}, doi = {10.1007/978-3-662-53644-5\_3}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiCHR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-Soled16, author = {Dana Dachman{-}Soled}, editor = {Martin Hirt and Adam D. Smith}, title = {Towards Non-Black-Box Separations of Public Key Encryption and One Way Function}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {169--191}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_7}, doi = {10.1007/978-3-662-53644-5\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-Soled16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardHO16, author = {Ivan Damg{\aa}rd and Helene Haagh and Claudio Orlandi}, editor = {Martin Hirt and Adam D. Smith}, title = {Access Control Encryption: Enforcing Information Flow with Cryptography}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {547--576}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_21}, doi = {10.1007/978-3-662-53644-5\_21}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DamgardHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargMMSSZ16, author = {Sanjam Garg and Eric Miles and Pratyay Mukherjee and Amit Sahai and Akshayaram Srinivasan and Mark Zhandry}, editor = {Martin Hirt and Adam D. Smith}, title = {Secure Obfuscation in a Weak Multilinear Map Model}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {241--268}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_10}, doi = {10.1007/978-3-662-53644-5\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GargMMSSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargS16, author = {Sanjam Garg and Akshayaram Srinivasan}, editor = {Martin Hirt and Adam D. Smith}, title = {Single-Key to Multi-Key Functional Encryption with Polynomial Loss}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {419--442}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_16}, doi = {10.1007/978-3-662-53644-5\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GargS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalKW16, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, editor = {Martin Hirt and Adam D. Smith}, title = {Semi-adaptive Security and Bundling Functionalities Made Generic and Easy}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {361--388}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_14}, doi = {10.1007/978-3-662-53644-5\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoyalKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HofheinzJR16, author = {Dennis Hofheinz and Tibor Jager and Andy Rupp}, editor = {Martin Hirt and Adam D. Smith}, title = {Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {146--168}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_6}, doi = {10.1007/978-3-662-53644-5\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HofheinzJR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HofheinzRW16, author = {Dennis Hofheinz and Vanishree Rao and Daniel Wichs}, editor = {Martin Hirt and Adam D. Smith}, title = {Standard Security Does Not Imply Indistinguishability Under Selective Opening}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {121--145}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_5}, doi = {10.1007/978-3-662-53644-5\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HofheinzRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KalaiP16, author = {Yael Tauman Kalai and Omer Paneth}, editor = {Martin Hirt and Adam D. Smith}, title = {Delegating {RAM} Computations}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {91--118}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_4}, doi = {10.1007/978-3-662-53644-5\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KalaiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KomargodskiNY16, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, editor = {Martin Hirt and Adam D. Smith}, title = {How to Share a Secret, Infinitely}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {485--514}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_19}, doi = {10.1007/978-3-662-53644-5\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KomargodskiNY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LiM16, author = {Baiyu Li and Daniele Micciancio}, editor = {Martin Hirt and Adam D. Smith}, title = {Compactness vs Collusion Resistance in Functional Encryption}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {443--468}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_17}, doi = {10.1007/978-3-662-53644-5\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/LiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PeikertS16, author = {Chris Peikert and Sina Shiehian}, editor = {Martin Hirt and Adam D. Smith}, title = {Multi-key {FHE} from LWE, Revisited}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {217--238}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_9}, doi = {10.1007/978-3-662-53644-5\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PeikertS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/TarghiU16, author = {Ehsan Ebrahimi Targhi and Dominique Unruh}, editor = {Martin Hirt and Adam D. Smith}, title = {Post-Quantum Security of the Fujisaki-Okamoto and {OAEP} Transforms}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {192--216}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_8}, doi = {10.1007/978-3-662-53644-5\_8}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/TarghiU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2016b2, editor = {Martin Hirt and Adam D. Smith}, title = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5}, doi = {10.1007/978-3-662-53644-5}, isbn = {978-3-662-53643-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2016b2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.