


default search action
35th ICALP 2008: Reykjavik, Iceland - Part II
- Luca Aceto, Ivan Damgård, Leslie Ann Goldberg, Magnús M. Halldórsson

, Anna Ingólfsdóttir, Igor Walukiewicz:
Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations. Lecture Notes in Computer Science 5126, Springer 2008, ISBN 978-3-540-70582-6
Invited Lectures
- Ran Canetti:

Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency. 1-13 - Javier Esparza

, Stefan Kiefer, Michael Luttenberger:
Newton's Method for omega-Continuous Semirings. 14-26
Track B: Logic, Semantics, and Theory of Programming
Bounds
- Henrik Björklund, Wim Martens:

The Tractability Frontier for NFA Minimization. 27-38 - Hermann Gruber

, Markus Holzer
:
Finite Automata, Digraph Connectivity, and Regular Expression Size. 39-50 - Tomasz Jurdzinski

:
Leftist Grammars Are Non-primitive Recursive. 51-62 - Artur Jez

, Alexander Okhotin
:
On the Computational Completeness of Equations over Sets of Natural Numbers. 63-74
Distributed Computation
- Matthias Neubauer, Peter Thiemann:

Placement Inference for a Client-Server Calculus. 75-86 - Magnus Johansson, Joachim Parrow, Björn Victor, Jesper Bengtson:

Extended pi-Calculi. 87-98 - Martin Berger

, Kohei Honda, Nobuko Yoshida
:
Completeness and Logical Full Abstraction in Modal Logics for Typed Mobile Processes. 99-111
Real-Time and Probabilistic Systems
- Bernard Boigelot, Julien Brusten, Véronique Bruyère:

On the Sets of Real Numbers Recognized by Finite Automata in Multiple Bases. 112-123 - Patricia Bouyer, Nicolas Markey

, Joël Ouaknine
, James Worrell
:
On Expressiveness and Complexity in Real-Time Model Checking. 124-135 - Vladimeros Vladimerou, Pavithra Prabhakar, Mahesh Viswanathan, Geir E. Dullerud:

STORMED Hybrid Systems. 136-147 - Tomás Brázdil, Vojtech Forejt, Antonín Kucera:

Controller Synthesis and Verification for Markov Decision Processes with Qualitative Branching Time Objectives. 148-159
Logic and Complexity
- Anuj Dawar

, Stephan Kreutzer:
On Datalog vs. LFP. 160-171 - László Egri, Benoît Larose, Pascal Tesson:

Directed st-Connectivity Is Not Expressible in Symmetric Datalog. 172-183 - Manuel Bodirsky

, Martin Grohe
:
Non-dichotomies in Constraint Satisfaction Complexity. 184-196 - Hubie Chen:

Quantified Constraint Satisfaction and the Polynomially Generated Powers Property. 197-208
Words and Trees
- Antonio Cano Gómez, Giovanna Guaiana, Jean-Eric Pin:

When Does Partial Commutative Closure Preserve Regularity? 209-220 - Christian Mathissen:

Weighted Logics for Nested Words and Algebraic Formal Power Series. 221-232 - Mikolaj Bojanczyk, Luc Segoufin:

Tree Languages Defined in First-Order Logic with One Quantifier Alternation. 233-245 - Mai Gehrke, Serge Grigorieff, Jean-Eric Pin:

Duality and Equational Theory of Regular Languages. 246-257
Nonstandard Models of Computation
- Tetsuo Yokoyama, Holger Bock Axelsen, Robert Glück

:
Reversible Flowchart Languages and the Structured Reversible Program Theorem. 258-270 - Shin-ya Katsumata

:
Attribute Grammars and Categorical Semantics. 271-282 - Keye Martin:

A Domain Theoretic Model of Qubit Channels. 283-297 - Bob Coecke, Ross Duncan

:
Interacting Quantum Observables. 298-310
Reasoning about Computation
- Delia Kesner:

Perpetuality for Full and Safe Composition (in a Constructive Setting). 311-322 - Sylvain Lebresne:

A System F with Call-by-Name Exceptions. 323-335 - Robert J. Simmons

, Frank Pfenning:
Linear Logical Algorithms. 336-347 - Lars Birkedal, Bernhard Reus

, Jan Schwinghammer, Hongseok Yang:
A Simple Model of Separation Logic for Higher-Order Store. 348-360
Verification
- Karin Greimel, Roderick Bloem, Barbara Jobstmann, Moshe Y. Vardi:

Open Implication. 361-372 - Sven Schewe

:
ATL* Satisfiability Is 2EXPTIME-Complete. 373-385 - Jean-François Raskin, Frédéric Servais:

Visibly Pushdown Transducers. 386-397 - Thomas Colcombet, Christof Löding:

The Non-deterministic Mostowski Hierarchy and Distance-Parity Automata. 398-409 - Roland Axelsson, Keijo Heljanko

, Martin Lange:
Analyzing Context-Free Grammars Using an Incremental SAT Solver. 410-422
Track C: Security and Cryptography Foundations
Theory
- Krzysztof Pietrzak, Johan Sjödin:

Weak Pseudorandom Functions in Minicrypt. 423-436 - Kristina Altmann, Tibor Jager, Andy Rupp:

On Black-Box Ring Extraction and Integer Factorization. 437-448 - Ran Canetti, Ronny Ramzi Dakdouk:

Extractable Perfectly One-Way Functions. 449-460 - Bartosz Przydatek, Jürg Wullschleger:

Error-Tolerant Combiners for Oblivious Primitives. 461-472
Secure Computation
- Martin Hirt, Jesper Buus Nielsen

, Bartosz Przydatek:
Asynchronous Multi-Party Computation with Quadratic Communication. 473-485 - Vladimir Kolesnikov, Thomas Schneider

:
Improved Garbled Circuit: Free XOR Gates and Applications. 486-498 - Jonathan Katz, Chiu-Yuen Koo, Ranjit Kumaresan:

Improving the Round Complexity of VSS in Point-to-Point Networks. 499-510 - Ran Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim:

How to Protect Yourself without Perfect Shredding. 511-523
Two-Party Protocols and Zero-Knowledge
- Kaoru Kurosawa, Jun Furukawa:

Universally Composable Undeniable Signature. 524-535 - Yael Tauman Kalai, Ran Raz:

Interactive PCP. 536-547 - Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti:

Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model. 548-559
Encryption with Special Properties/Quantum Cryptography
- Elaine Shi, Brent Waters:

Delegating Capabilities in Predicate Encryption Systems. 560-578 - Vipul Goyal, Abhishek Jain, Omkant Pandey, Amit Sahai:

Bounded Ciphertext Policy Attribute Based Encryption. 579-591 - Sean Hallgren, Alexandra Kolla, Pranab Sen, Shengyu Zhang:

Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks. 592-603 - Stephanie Wehner, Jürg Wullschleger:

Composable Security in the Bounded-Quantum-Storage Model. 604-615
Various Types of Hashing
- Jonathan J. Hoch, Adi Shamir:

On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak. 616-630 - Moni Naor, Gil Segev, Udi Wieder:

History-Independent Cuckoo Hashing. 631-642 - Thomas Shrimpton, Martijn Stam:

Building a Collision-Resistant Compression Function from Non-compressing Primitives. 643-654 - Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak:

Robust Multi-property Combiners for Hash Functions Revisited. 655-666
Public-Key Cryptography/Authentication
- Manoj Prabhakaran, Mike Rosulek:

Homomorphic Encryption with CCA Security. 667-678 - Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:

How to Encrypt with the LPN Problem. 679-690 - Jintai Ding

, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng:
Could SFLASH be Repaired?. 691-701 - Vladimir Kolesnikov, Charles Rackoff:

Password Mistyping in Two-Factor-Authenticated Key Exchange. 702-714 - Stanislaw Jarecki, Xiaomin Liu:

Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. 715-726

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














