1. TCC 2004:
Cambridge,
MA,
USA
Moni Naor (Ed.):
Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings.
Lecture Notes in Computer Science 2951 Springer 2004, ISBN 3-540-21000-8 BibTeX
@proceedings{DBLP:conf/tcc/2004,
editor = {Moni Naor},
title = {Theory of Cryptography, First Theory of Cryptography Conference,
TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
booktitle = {TCC},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2951},
year = {2004},
isbn = {3-540-21000-8},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Omer Reingold, Luca Trevisan, Salil P. Vadhan:
Notions of Reducibility between Cryptographic Primitives.
1-20
Electronic Edition (link) BibTeX
- Ueli M. Maurer, Renato Renner, Clemens Holenstein:
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology.
21-39
Electronic Edition (link) BibTeX
- Ran Canetti, Oded Goldreich, Shai Halevi:
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes.
40-57
Electronic Edition (link) BibTeX
- Dennis Hofheinz, Jörn Müller-Quade:
Universally Composable Commitments Using Random Oracles.
58-76
Electronic Edition (link) BibTeX
- Shafi Goldwasser, Erez Waisbard:
Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes.
77-100
Electronic Edition (link) BibTeX
- Cynthia Dwork, Ronen Shaltiel, Adam Smith, Luca Trevisan:
List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument.
101-120
Electronic Edition (link) BibTeX
- Boaz Barak, Rafael Pass:
On the Possibility of One-Message Weak Zero-Knowledge.
121-132
Electronic Edition (link) BibTeX
- Daniele Micciancio, Bogdan Warinschi:
Soundness of Formal Encryption in the Presence of Active Adversaries.
133-151
Electronic Edition (link) BibTeX
- Jens Groth:
Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems.
152-170
Electronic Edition (link) BibTeX
- Philip D. MacKenzie, Michael K. Reiter, Ke Yang:
Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract).
171-190
Electronic Edition (link) BibTeX
- Alon Rosen:
A Note on Constant-Round Zero-Knowledge Proofs for NP.
191-202
Electronic Edition (link) BibTeX
- Yehuda Lindell:
Lower Bounds for Concurrent Self Composition.
203-222
Electronic Edition (link) BibTeX
- Ronald Cramer, Ivan Damgård:
Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation.
223-237
Electronic Edition (link) BibTeX
- Amos Beimel, Tal Malkin:
A Quantitative Approach to Reductions in Secure Computation.
238-257
Electronic Edition (link) BibTeX
- Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin:
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
258-277
Electronic Edition (link) BibTeX
- Silvio Micali, Leonid Reyzin:
Physically Observable Cryptography (Extended Abstract).
278-296
Electronic Edition (link) BibTeX
- Juan A. Garay:
Efficient and Universally Composable Committed Oblivious Transfer and Applications.
297-316
Electronic Edition (link) BibTeX
- Douglas Wikström:
A Universally Composable Mix-Net.
317-335
Electronic Edition (link) BibTeX
- Michael Backes, Birgit Pfitzmann, Michael Waidner:
A General Composition Theorem for Secure Reactive Systems.
336-354
Electronic Edition (link) BibTeX
- Ivan Damgård, Serge Fehr, Kirill Morozov, Louis Salvail:
Unfair Noisy Channels and Oblivious Transfer.
355-373
Electronic Edition (link) BibTeX
- Claude Crépeau, Paul Dumais, Dominic Mayers, Louis Salvail:
Computational Collapse of Quantum State with Application to Oblivious Transfer.
374-393
Electronic Edition (link) BibTeX
- Iftach Haitner:
Implementing Oblivious Transfer Using Collection of Dense Trapdoor Permutations.
394-409
Electronic Edition (link) BibTeX
- Ueli M. Maurer, Krzysztof Pietrzak:
Composition of Random Systems: When Two Weak Make One Strong.
410-427
Electronic Edition (link) BibTeX
- Minh-Huyen Nguyen, Salil P. Vadhan:
Simpler Session-Key Generation from Short Random Passwords.
428-445
Electronic Edition (link) BibTeX
- Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel:
Constant-Round Oblivious Transfer in the Bounded Storage Model.
446-472
Electronic Edition (link) BibTeX
- Tamir Tassa:
Hierarchical Threshold Secret Sharing.
473-490
Electronic Edition (link) BibTeX
- Mark Johnson, David Wagner, Kannan Ramchandran:
On Compressing Encrypted Data without the Encryption Key.
491-504
Electronic Edition (link) BibTeX
- Ronald L. Rivest:
On the Notion of Pseudo-Free Groups.
505-521
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:43:38 2009
by Michael Ley (ley@uni-trier.de)