


default search action
33rd ICALP 2006: Venice, Italy
- Michele Bugliesi, Bart Preneel, Vladimiro Sassone, Ingo Wegener:

Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II. Lecture Notes in Computer Science 4052, Springer 2006, ISBN 3-540-35907-9
Invited Papers
- Cynthia Dwork:

Differential Privacy. 1-12 - Vincent Danos, Elham Kashefi, Prakash Panangaden:

The One Way to Quantum Computation. 13-21
Zero-Knowledge and Signatures
- Ivan Visconti:

Efficient Zero Knowledge on the Internet. 22-33 - Rosario Gennaro, Silvio Micali:

Independent Zero-Knowledge Sets. 34-45 - Jun Furukawa, Kaoru Kurosawa, Hideki Imai:

An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge. 46-57 - Damien Vergnaud

:
New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures. 58-69
Cryptographic Protocols
- Daniele Micciancio

, Saurabh Panjwani:
Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. 70-82 - Pedro Adão, Cédric Fournet:

Cryptographically Sound Implementations for Communicating Processes. 83-94 - Detlef Kähler, Ralf Küsters, Thomas Wilke:

A Dolev-Yao-Based Definition of Abuse-Free Protocols. 95-106
Secrecy and Protocol Analysis
- Rajeev Alur, Pavol Cerný, Steve Zdancewic:

Preserving Secrecy Under Refinement. 107-118 - Michele Boreale

:
Quantifying Information Leakage in Process Calculi. 119-131 - Stéphanie Delaune, Pascal Lafourcade

, Denis Lugiez, Ralf Treinen:
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or. 132-143
Cryptographic Primitives
- Vadim Lyubashevsky

, Daniele Micciancio
:
Generalized Compact Knapsacks Are Collision Resistant. 144-155 - Vivien Dubois, Louis Granboulan, Jacques Stern:

An Efficient Provable Distinguisher for HFE. 156-167 - Krzysztof Pietrzak:

A Tight Bound for EMAC. 168-179 - Frederik Armknecht, Matthias Krause:

Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity. 180-191
Bounded Storage and Quantum Models
- Danny Harnik, Moni Naor:

On Everlasting Security in the Hybrid Bounded Storage Model. 192-203 - Yevgeniy Dodis, Renato Renner:

On the Impossibility of Extracting Classical Randomness Using a Quantum Computer. 204-215 - Akinori Kawachi, Tomoyuki Yamakami:

Quantum Hardcore Functions by Complexity-Theoretical Quantum List Decoding. 216-227
Foundations
- Iftach Haitner, Danny Harnik, Omer Reingold:

Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions. 228-239 - Pierre-Alain Fouque, David Pointcheval

, Jacques Stern, Sébastien Zimmer:
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. 240-251 - Ricardo Corin, Jerry den Hartog:

A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs. 252-263
Multi-party Protocols
- Duong Hieu Phan

, Reihaneh Safavi-Naini, Dongvu Tonien
:
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. 264-275 - Douglas Wikström, Jens Groth

:
An Adaptively Secure Mix-Net Without Erasures. 276-287 - Tamir Tassa, Nira Dyn:

Multipartite Secret Sharing by Bivariate Interpolation. 288-299 - Michel Abdalla

, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart:
Identity-Based Encryption Gone Wild. 300-311
Games
- Hugo Gimbert, Wieslaw Zielonka:

Deterministic Priority Mean-Payoff Games as Limits of Discounted Games. 312-323 - Kousha Etessami, Mihalis Yannakakis:

Recursive Concurrent Stochastic Games. 324-335 - Eryk Kopczynski:

Half-Positional Determinacy of Infinite Games. 336-347 - Colin Stirling:

A Game-Theoretic Approach to Deciding Higher-Order Matching. 348-359
Semantics
- Kohei Honda, Martin Berger

, Nobuko Yoshida
:
Descriptive and Relative Completeness of Logics for Higher-Order Functions. 360-371 - Rasmus Ejlers Møgelberg:

Interpreting Polymorphic FPC into Domain Theoretic Models of Parametric Polymorphism. 372-383 - Esfandiar Haghverdi:

Typed GoI for Exponentials. 384-395 - Stefano Guerrini, Patrizia Marzuoli:

Commutative Locative Quantifiers for Multiplicative Linear Logic. 396-407
Automata I
- Filip Murlak:

The Wadge Hierarchy of Deterministic Tree Languages. 408-419 - Patricia Bouyer, Serge Haddad, Pierre-Alain Reynier:

Timed Petri Nets and Timed Automata: On the Discriminating Power of Zeno Sequences. 420-431 - Tomasz Jurdzinski:

On Complexity of Grammars Related to the Safety Problem. 432-443
Models
- Paul Blain Levy:

Jumbo lambda-Calculus. 444-455 - Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely

:
lambda-RBAC: Programming with Role-Based Access Control. 456-467 - Juhani Karhumäki, Michal Kunc, Alexander Okhotin:

Communication of Two Stacks and Rewriting. 468-479
Equations
- Luca Aceto, Taolue Chen

, Wan J. Fokkink
, Anna Ingólfsdóttir:
On the Axiomatizability of Priority. 480-491 - Luca Aceto, Wan J. Fokkink

, Anna Ingólfsdóttir, Bas Luttik:
A Finite Equational Base for CCS with Left Merge and Communication Merge. 492-503 - Markus Lohrey, Géraud Sénizergues:

Theories of HNN-Extensions and Amalgamated Products. 504-515 - Karianto Wong, Aloys Krieg

, Wolfgang Thomas:
On Intersection Problems for Polynomially Generated Sets. 516-527
Logics
- Ittai Balaban, Amir Pnueli, Lenore D. Zuck:

Invisible Safety of Distributed Protocols. 528-539 - Piero A. Bonatti

, Carsten Lutz
, Aniello Murano
, Moshe Y. Vardi:
The Complexity of Enriched µ-Calculi. 540-551 - Michael Benedikt

, Christoph Koch:
Interpreting Tree-to-Tree Queries. 552-564
Automata II
- Blaise Genest, Anca Muscholl:

Constructing Exponential-Size Deterministic Zielonka Automata. 565-576 - Marius Bozga, Radu Iosif, Yassine Lakhnech:

Flat Parametric Counter Automata. 577-588 - Qiqi Yan:

Lower Bounds for Complementation of omega-Automata Via the Full Automata Technique. 589-600

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














