Search dblp for Publications

export results for "toc:db/conf/tcc/tcc2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/tcc/AbrahamDH08,
  author       = {Ittai Abraham and
                  Danny Dolev and
                  Joseph Y. Halpern},
  editor       = {Ran Canetti},
  title        = {Lower Bounds on Implementing Robust and Resilient Mediators},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {302--319},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_17},
  doi          = {10.1007/978-3-540-78524-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AbrahamDH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaFHMZ08,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Matthias Fitzi and
                  Martin Hirt and
                  Ueli M. Maurer and
                  Vassilis Zikas},
  editor       = {Ran Canetti},
  title        = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {231--250},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_14},
  doi          = {10.1007/978-3-540-78524-8\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaFHMZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaH08,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Martin Hirt},
  editor       = {Ran Canetti},
  title        = {Perfectly-Secure {MPC} with Linear Communication Complexity},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {213--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_13},
  doi          = {10.1007/978-3-540-78524-8\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BeimelLP08,
  author       = {Amos Beimel and
                  Noam Livne and
                  Carles Padr{\'{o}}},
  editor       = {Ran Canetti},
  title        = {Matroids Can Be Far from Ideal Secret Sharing},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {194--212},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_12},
  doi          = {10.1007/978-3-540-78524-8\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BeimelLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BelenkiyCKL08,
  author       = {Mira Belenkiy and
                  Melissa Chase and
                  Markulf Kohlweiss and
                  Anna Lysyanskaya},
  editor       = {Ran Canetti},
  title        = {P-signatures and Noninteractive Anonymous Credentials},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {356--374},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_20},
  doi          = {10.1007/978-3-540-78524-8\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BelenkiyCKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BihamGI08,
  author       = {Eli Biham and
                  Yaron J. Goren and
                  Yuval Ishai},
  editor       = {Ran Canetti},
  title        = {Basing Weak Public-Key Cryptography on Strong One-Way Functions},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {55--72},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_4},
  doi          = {10.1007/978-3-540-78524-8\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BihamGI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChaillouxCKV08,
  author       = {Andr{\'{e}} Chailloux and
                  Dragos Florin Ciocan and
                  Iordanis Kerenidis and
                  Salil P. Vadhan},
  editor       = {Ran Canetti},
  title        = {Interactive and Noninteractive Zero Knowledge are Equivalent in the
                  Help Model},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {501--534},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_28},
  doi          = {10.1007/978-3-540-78524-8\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChaillouxCKV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChoiDMW08,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  editor       = {Ran Canetti},
  title        = {Black-Box Construction of a Non-malleable Encryption Scheme from Any
                  Semantically Secure One},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {427--444},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_24},
  doi          = {10.1007/978-3-540-78524-8\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChoiDMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DedicHR08,
  author       = {Nenad Dedic and
                  Danny Harnik and
                  Leonid Reyzin},
  editor       = {Ran Canetti},
  title        = {Saving Private Randomness in One-Way Functions and Pseudorandom Generators},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {607--625},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_33},
  doi          = {10.1007/978-3-540-78524-8\_33},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DedicHR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FehrS08,
  author       = {Serge Fehr and
                  Christian Schaffner},
  editor       = {Ran Canetti},
  title        = {Randomness Extraction Via \emph{delta} -Biased Masking in the Presence
                  of a Quantum Attacker},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {465--481},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_26},
  doi          = {10.1007/978-3-540-78524-8\_26},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FehrS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FischlinL08,
  author       = {Marc Fischlin and
                  Anja Lehmann},
  editor       = {Ran Canetti},
  title        = {Multi-property Preserving Combiners for Hash Functions},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {375--392},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_21},
  doi          = {10.1007/978-3-540-78524-8\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FischlinL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Gennaro08,
  author       = {Rosario Gennaro},
  editor       = {Ran Canetti},
  title        = {Faster and Shorter Password-Authenticated Key Exchange},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {589--606},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_32},
  doi          = {10.1007/978-3-540-78524-8\_32},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Gennaro08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalK08,
  author       = {Vipul Goyal and
                  Jonathan Katz},
  editor       = {Ran Canetti},
  title        = {Universally Composable Multi-party Computation with an Unreliable
                  Common Reference String},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {142--154},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_9},
  doi          = {10.1007/978-3-540-78524-8\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Haitner08,
  author       = {Iftach Haitner},
  editor       = {Ran Canetti},
  title        = {Semi-honest to Malicious Oblivious Transfer - The Black-Box Way},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {412--426},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_23},
  doi          = {10.1007/978-3-540-78524-8\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Haitner08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaitnerHS08,
  author       = {Iftach Haitner and
                  Jonathan J. Hoch and
                  Gil Segev},
  editor       = {Ran Canetti},
  title        = {A Linear Lower Bound on the Communication Complexity of Single-Server
                  Private Information Retrieval},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {445--464},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_25},
  doi          = {10.1007/978-3-540-78524-8\_25},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HaitnerHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaleviMR08,
  author       = {Shai Halevi and
                  Steven A. Myers and
                  Charles Rackoff},
  editor       = {Ran Canetti},
  title        = {On Seed-Incompressible Functions},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_2},
  doi          = {10.1007/978-3-540-78524-8\_2},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HaleviMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaleviR08,
  author       = {Shai Halevi and
                  Tal Rabin},
  editor       = {Ran Canetti},
  title        = {Degradation and Amplification of Computational Hardness},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {626--643},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_34},
  doi          = {10.1007/978-3-540-78524-8\_34},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HaleviR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HarnikIKN08,
  author       = {Danny Harnik and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Jesper Buus Nielsen},
  editor       = {Ran Canetti},
  title        = {OT-Combiners via Secure Computation},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {393--411},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_22},
  doi          = {10.1007/978-3-540-78524-8\_22},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HarnikIKN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayL08,
  author       = {Carmit Hazay and
                  Yehuda Lindell},
  editor       = {Ran Canetti},
  title        = {Efficient Protocols for Set Intersection and Pattern Matching with
                  Security Against Malicious and Covert Adversaries},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {155--175},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_10},
  doi          = {10.1007/978-3-540-78524-8\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HerzbergY08,
  author       = {Amir Herzberg and
                  Igal Yoffe},
  editor       = {Ran Canetti},
  title        = {The Layered Games Framework for Specifications and Analysis of Security
                  Protocols},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {125--141},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_8},
  doi          = {10.1007/978-3-540-78524-8\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HerzbergY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IzmalkovLM08,
  author       = {Sergei Izmalkov and
                  Matt Lepinski and
                  Silvio Micali},
  editor       = {Ran Canetti},
  title        = {Verifiably Secure Devices},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {273--301},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_16},
  doi          = {10.1007/978-3-540-78524-8\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/IzmalkovLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Katz08,
  author       = {Jonathan Katz},
  editor       = {Ran Canetti},
  title        = {Which Languages Have 4-Round Zero-Knowledge Proofs?},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {73--88},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_5},
  doi          = {10.1007/978-3-540-78524-8\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Katz08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Katz08a,
  author       = {Jonathan Katz},
  editor       = {Ran Canetti},
  title        = {Bridging Game Theory and Cryptography: Recent Results and Future Directions},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {251--272},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_15},
  doi          = {10.1007/978-3-540-78524-8\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Katz08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KiayiasZ08,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  editor       = {Ran Canetti},
  title        = {Equivocal Blind Signatures and Adaptive UC-Security},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {340--355},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_19},
  doi          = {10.1007/978-3-540-78524-8\_19},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KiayiasZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KilianMSZ08,
  author       = {Joe Kilian and
                  Andr{\'{e}} Madeira and
                  Martin J. Strauss and
                  Xuan Zheng},
  editor       = {Ran Canetti},
  title        = {Fast Private Norm Estimation and Heavy Hitters},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {176--193},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_11},
  doi          = {10.1007/978-3-540-78524-8\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KilianMSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Kobayashi08,
  author       = {Hirotada Kobayashi},
  editor       = {Ran Canetti},
  title        = {General Properties of Quantum Zero-Knowledge Proofs},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {107--124},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_7},
  doi          = {10.1007/978-3-540-78524-8\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Kobayashi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KolN08,
  author       = {Gillat Kol and
                  Moni Naor},
  editor       = {Ran Canetti},
  title        = {Cryptography and Game Theory: Designing Protocols for Exchanging Information},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {320--339},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_18},
  doi          = {10.1007/978-3-540-78524-8\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KolN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LinPV08,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Ran Canetti},
  title        = {Concurrent Non-malleable Commitments from Any One-Way Function},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {571--588},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_31},
  doi          = {10.1007/978-3-540-78524-8\_31},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LinPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LyubashevskyM08,
  author       = {Vadim Lyubashevsky and
                  Daniele Micciancio},
  editor       = {Ran Canetti},
  title        = {Asymptotically Efficient Lattice-Based Digital Signatures},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_3},
  doi          = {10.1007/978-3-540-78524-8\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/LyubashevskyM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Malka08,
  author       = {Lior Malka},
  editor       = {Ran Canetti},
  title        = {How to Achieve Perfect Simulation and {A} Complete Problem for Non-interactive
                  Perfect Zero-Knowledge},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_6},
  doi          = {10.1007/978-3-540-78524-8\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Malka08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MicciancioY08,
  author       = {Daniele Micciancio and
                  Scott Yilek},
  editor       = {Ran Canetti},
  title        = {The Round-Complexity of Black-Box Zero-Knowledge: {A} Combinatorial
                  Characterization},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {535--552},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_29},
  doi          = {10.1007/978-3-540-78524-8\_29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/MicciancioY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/OngV08,
  author       = {Shien Jin Ong and
                  Salil P. Vadhan},
  editor       = {Ran Canetti},
  title        = {An Equivalence Between Zero Knowledge and Commitments},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {482--500},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_27},
  doi          = {10.1007/978-3-540-78524-8\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/OngV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PassV08,
  author       = {Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Ran Canetti},
  title        = {On Constant-Round Concurrent Zero-Knowledge},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {553--570},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_30},
  doi          = {10.1007/978-3-540-78524-8\_30},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PassV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Valiant08,
  author       = {Paul Valiant},
  editor       = {Ran Canetti},
  title        = {Incrementally Verifiable Computation or Proofs of Knowledge Imply
                  Time/Space Efficiency},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_1},
  doi          = {10.1007/978-3-540-78524-8\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Valiant08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2008,
  editor       = {Ran Canetti},
  title        = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8},
  doi          = {10.1007/978-3-540-78524-8},
  isbn         = {978-3-540-78523-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics