Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/tcc/tcc2008.bht:"
@inproceedings{DBLP:conf/tcc/AbrahamDH08, author = {Ittai Abraham and Danny Dolev and Joseph Y. Halpern}, editor = {Ran Canetti}, title = {Lower Bounds on Implementing Robust and Resilient Mediators}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {302--319}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_17}, doi = {10.1007/978-3-540-78524-8\_17}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AbrahamDH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaFHMZ08, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Matthias Fitzi and Martin Hirt and Ueli M. Maurer and Vassilis Zikas}, editor = {Ran Canetti}, title = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {231--250}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_14}, doi = {10.1007/978-3-540-78524-8\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaFHMZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaH08, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Martin Hirt}, editor = {Ran Canetti}, title = {Perfectly-Secure {MPC} with Linear Communication Complexity}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {213--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_13}, doi = {10.1007/978-3-540-78524-8\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BeimelLP08, author = {Amos Beimel and Noam Livne and Carles Padr{\'{o}}}, editor = {Ran Canetti}, title = {Matroids Can Be Far from Ideal Secret Sharing}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {194--212}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_12}, doi = {10.1007/978-3-540-78524-8\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BeimelLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BelenkiyCKL08, author = {Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya}, editor = {Ran Canetti}, title = {P-signatures and Noninteractive Anonymous Credentials}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {356--374}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_20}, doi = {10.1007/978-3-540-78524-8\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BelenkiyCKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BihamGI08, author = {Eli Biham and Yaron J. Goren and Yuval Ishai}, editor = {Ran Canetti}, title = {Basing Weak Public-Key Cryptography on Strong One-Way Functions}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {55--72}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_4}, doi = {10.1007/978-3-540-78524-8\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BihamGI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChaillouxCKV08, author = {Andr{\'{e}} Chailloux and Dragos Florin Ciocan and Iordanis Kerenidis and Salil P. Vadhan}, editor = {Ran Canetti}, title = {Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {501--534}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_28}, doi = {10.1007/978-3-540-78524-8\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChaillouxCKV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChoiDMW08, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, editor = {Ran Canetti}, title = {Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {427--444}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_24}, doi = {10.1007/978-3-540-78524-8\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChoiDMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DedicHR08, author = {Nenad Dedic and Danny Harnik and Leonid Reyzin}, editor = {Ran Canetti}, title = {Saving Private Randomness in One-Way Functions and Pseudorandom Generators}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {607--625}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_33}, doi = {10.1007/978-3-540-78524-8\_33}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DedicHR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FehrS08, author = {Serge Fehr and Christian Schaffner}, editor = {Ran Canetti}, title = {Randomness Extraction Via \emph{delta} -Biased Masking in the Presence of a Quantum Attacker}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {465--481}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_26}, doi = {10.1007/978-3-540-78524-8\_26}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FehrS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FischlinL08, author = {Marc Fischlin and Anja Lehmann}, editor = {Ran Canetti}, title = {Multi-property Preserving Combiners for Hash Functions}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {375--392}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_21}, doi = {10.1007/978-3-540-78524-8\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FischlinL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Gennaro08, author = {Rosario Gennaro}, editor = {Ran Canetti}, title = {Faster and Shorter Password-Authenticated Key Exchange}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {589--606}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_32}, doi = {10.1007/978-3-540-78524-8\_32}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Gennaro08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalK08, author = {Vipul Goyal and Jonathan Katz}, editor = {Ran Canetti}, title = {Universally Composable Multi-party Computation with an Unreliable Common Reference String}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {142--154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_9}, doi = {10.1007/978-3-540-78524-8\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoyalK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Haitner08, author = {Iftach Haitner}, editor = {Ran Canetti}, title = {Semi-honest to Malicious Oblivious Transfer - The Black-Box Way}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {412--426}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_23}, doi = {10.1007/978-3-540-78524-8\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Haitner08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaitnerHS08, author = {Iftach Haitner and Jonathan J. Hoch and Gil Segev}, editor = {Ran Canetti}, title = {A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {445--464}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_25}, doi = {10.1007/978-3-540-78524-8\_25}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HaitnerHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaleviMR08, author = {Shai Halevi and Steven A. Myers and Charles Rackoff}, editor = {Ran Canetti}, title = {On Seed-Incompressible Functions}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {19--36}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_2}, doi = {10.1007/978-3-540-78524-8\_2}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HaleviMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaleviR08, author = {Shai Halevi and Tal Rabin}, editor = {Ran Canetti}, title = {Degradation and Amplification of Computational Hardness}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {626--643}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_34}, doi = {10.1007/978-3-540-78524-8\_34}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HaleviR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HarnikIKN08, author = {Danny Harnik and Yuval Ishai and Eyal Kushilevitz and Jesper Buus Nielsen}, editor = {Ran Canetti}, title = {OT-Combiners via Secure Computation}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {393--411}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_22}, doi = {10.1007/978-3-540-78524-8\_22}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HarnikIKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayL08, author = {Carmit Hazay and Yehuda Lindell}, editor = {Ran Canetti}, title = {Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {155--175}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_10}, doi = {10.1007/978-3-540-78524-8\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HazayL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HerzbergY08, author = {Amir Herzberg and Igal Yoffe}, editor = {Ran Canetti}, title = {The Layered Games Framework for Specifications and Analysis of Security Protocols}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {125--141}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_8}, doi = {10.1007/978-3-540-78524-8\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HerzbergY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IzmalkovLM08, author = {Sergei Izmalkov and Matt Lepinski and Silvio Micali}, editor = {Ran Canetti}, title = {Verifiably Secure Devices}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {273--301}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_16}, doi = {10.1007/978-3-540-78524-8\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/IzmalkovLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Katz08, author = {Jonathan Katz}, editor = {Ran Canetti}, title = {Which Languages Have 4-Round Zero-Knowledge Proofs?}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {73--88}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_5}, doi = {10.1007/978-3-540-78524-8\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Katz08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Katz08a, author = {Jonathan Katz}, editor = {Ran Canetti}, title = {Bridging Game Theory and Cryptography: Recent Results and Future Directions}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {251--272}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_15}, doi = {10.1007/978-3-540-78524-8\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Katz08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KiayiasZ08, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, editor = {Ran Canetti}, title = {Equivocal Blind Signatures and Adaptive UC-Security}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {340--355}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_19}, doi = {10.1007/978-3-540-78524-8\_19}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KiayiasZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KilianMSZ08, author = {Joe Kilian and Andr{\'{e}} Madeira and Martin J. Strauss and Xuan Zheng}, editor = {Ran Canetti}, title = {Fast Private Norm Estimation and Heavy Hitters}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {176--193}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_11}, doi = {10.1007/978-3-540-78524-8\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KilianMSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Kobayashi08, author = {Hirotada Kobayashi}, editor = {Ran Canetti}, title = {General Properties of Quantum Zero-Knowledge Proofs}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {107--124}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_7}, doi = {10.1007/978-3-540-78524-8\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Kobayashi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KolN08, author = {Gillat Kol and Moni Naor}, editor = {Ran Canetti}, title = {Cryptography and Game Theory: Designing Protocols for Exchanging Information}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {320--339}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_18}, doi = {10.1007/978-3-540-78524-8\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KolN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LinPV08, author = {Huijia Lin and Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {Ran Canetti}, title = {Concurrent Non-malleable Commitments from Any One-Way Function}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {571--588}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_31}, doi = {10.1007/978-3-540-78524-8\_31}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LinPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LyubashevskyM08, author = {Vadim Lyubashevsky and Daniele Micciancio}, editor = {Ran Canetti}, title = {Asymptotically Efficient Lattice-Based Digital Signatures}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {37--54}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_3}, doi = {10.1007/978-3-540-78524-8\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/LyubashevskyM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Malka08, author = {Lior Malka}, editor = {Ran Canetti}, title = {How to Achieve Perfect Simulation and {A} Complete Problem for Non-interactive Perfect Zero-Knowledge}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {89--106}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_6}, doi = {10.1007/978-3-540-78524-8\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Malka08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MicciancioY08, author = {Daniele Micciancio and Scott Yilek}, editor = {Ran Canetti}, title = {The Round-Complexity of Black-Box Zero-Knowledge: {A} Combinatorial Characterization}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {535--552}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_29}, doi = {10.1007/978-3-540-78524-8\_29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/MicciancioY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/OngV08, author = {Shien Jin Ong and Salil P. Vadhan}, editor = {Ran Canetti}, title = {An Equivalence Between Zero Knowledge and Commitments}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {482--500}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_27}, doi = {10.1007/978-3-540-78524-8\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/OngV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PassV08, author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {Ran Canetti}, title = {On Constant-Round Concurrent Zero-Knowledge}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {553--570}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_30}, doi = {10.1007/978-3-540-78524-8\_30}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PassV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Valiant08, author = {Paul Valiant}, editor = {Ran Canetti}, title = {Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {1--18}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_1}, doi = {10.1007/978-3-540-78524-8\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Valiant08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2008, editor = {Ran Canetti}, title = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8}, doi = {10.1007/978-3-540-78524-8}, isbn = {978-3-540-78523-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.