Search dblp for Publications

export results for "toc:db/conf/tcc/tcc2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/tcc/AbdallaBN10,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Gregory Neven},
  editor       = {Daniele Micciancio},
  title        = {Robust Encryption},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {480--497},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_28},
  doi          = {10.1007/978-3-642-11799-2\_28},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AbdallaBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BangerterCK10,
  author       = {Endre Bangerter and
                  Jan Camenisch and
                  Stephan Krenn},
  editor       = {Daniele Micciancio},
  title        = {Efficiency Limitations for {\(\Sigma\)}-Protocols for Group Homomorphisms},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {553--571},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_33},
  doi          = {10.1007/978-3-642-11799-2\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BangerterCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BeimelKN10,
  author       = {Amos Beimel and
                  Shiva Prasad Kasiviswanathan and
                  Kobbi Nissim},
  editor       = {Daniele Micciancio},
  title        = {Bounds on the Sample Complexity for Private Learning and Private Data
                  Release},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {437--454},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_26},
  doi          = {10.1007/978-3-642-11799-2\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BeimelKN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BendlinD10,
  author       = {Rikke Bendlin and
                  Ivan Damg{\aa}rd},
  editor       = {Daniele Micciancio},
  title        = {Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_13},
  doi          = {10.1007/978-3-642-11799-2\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BendlinD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BirrellV10,
  author       = {Eleanor Birrell and
                  Salil P. Vadhan},
  editor       = {Daniele Micciancio},
  title        = {Composition of Zero-Knowledge Proofs with Efficient Provers},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {572--587},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_34},
  doi          = {10.1007/978-3-642-11799-2\_34},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BirrellV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Camenisch10,
  author       = {Jan Camenisch},
  editor       = {Daniele Micciancio},
  title        = {Privacy-Enhancing Cryptography: From Theory into Practice},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {498},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_29},
  doi          = {10.1007/978-3-642-11799-2\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Camenisch10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiKVW10,
  author       = {Ran Canetti and
                  Yael Tauman Kalai and
                  Mayank Varia and
                  Daniel Wichs},
  editor       = {Daniele Micciancio},
  title        = {On Symmetric Encryption and Point Obfuscation},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {52--71},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_4},
  doi          = {10.1007/978-3-642-11799-2\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiKVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiRV10,
  author       = {Ran Canetti and
                  Guy N. Rothblum and
                  Mayank Varia},
  editor       = {Daniele Micciancio},
  title        = {Obfuscation of Hyperplane Membership},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {72--89},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_5},
  doi          = {10.1007/978-3-642-11799-2\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiRV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChungL10,
  author       = {Kai{-}Min Chung and
                  Feng{-}Hao Liu},
  editor       = {Daniele Micciancio},
  title        = {Parallel Repetition Theorems for Interactive Arguments},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_2},
  doi          = {10.1007/978-3-642-11799-2\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChungL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CoronDMS10,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Yevgeniy Dodis and
                  Avradip Mandal and
                  Yannick Seurin},
  editor       = {Daniele Micciancio},
  title        = {A Domain Extender for the Ideal Cipher},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {273--289},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_17},
  doi          = {10.1007/978-3-642-11799-2\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CoronDMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CramerHK10,
  author       = {Ronald Cramer and
                  Dennis Hofheinz and
                  Eike Kiltz},
  editor       = {Daniele Micciancio},
  title        = {A Twist on the Naor-Yung Paradigm and Its Application to Efficient
                  CCA-Secure Encryption from Hard Search Problems},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {146--164},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_10},
  doi          = {10.1007/978-3-642-11799-2\_10},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CramerHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardGN10,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Jesper Buus Nielsen},
  editor       = {Daniele Micciancio},
  title        = {From Passive to Covert Security at Low Cost},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {128--145},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_9},
  doi          = {10.1007/978-3-642-11799-2\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardGN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardM10,
  author       = {Ivan Damg{\aa}rd and
                  Gert L{\ae}ss{\o}e Mikkelsen},
  editor       = {Daniele Micciancio},
  title        = {Efficient, Robust and Constant-Round Distributed {RSA} Key Generation},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {183--200},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_12},
  doi          = {10.1007/978-3-642-11799-2\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardNO10,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Claudio Orlandi},
  editor       = {Daniele Micciancio},
  title        = {On the Necessary and Sufficient Assumptions for {UC} Computation},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {109--127},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_8},
  doi          = {10.1007/978-3-642-11799-2\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardNO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisGKPV10,
  author       = {Yevgeniy Dodis and
                  Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Chris Peikert and
                  Vinod Vaikuntanathan},
  editor       = {Daniele Micciancio},
  title        = {Public-Key Encryption Schemes with Auxiliary Inputs},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {361--381},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_22},
  doi          = {10.1007/978-3-642-11799-2\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisGKPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FarrasP10,
  author       = {Oriol Farr{\`{a}}s and
                  Carles Padr{\'{o}}},
  editor       = {Daniele Micciancio},
  title        = {Ideal Hierarchical Secret Sharing Schemes},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {219--236},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_14},
  doi          = {10.1007/978-3-642-11799-2\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FarrasP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FaustKPR10,
  author       = {Sebastian Faust and
                  Eike Kiltz and
                  Krzysztof Pietrzak and
                  Guy N. Rothblum},
  editor       = {Daniele Micciancio},
  title        = {Leakage-Resilient Signatures},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {343--360},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_21},
  doi          = {10.1007/978-3-642-11799-2\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FaustKPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FischlinL10,
  author       = {Marc Fischlin and
                  Anja Lehmann},
  editor       = {Daniele Micciancio},
  title        = {Delayed-Key Message Authentication for Streams},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {290--307},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_18},
  doi          = {10.1007/978-3-642-11799-2\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FischlinL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FuchsbauerKN10,
  author       = {Georg Fuchsbauer and
                  Jonathan Katz and
                  David Naccache},
  editor       = {Daniele Micciancio},
  title        = {Efficient Rational Secret Sharing in Standard Communication Networks},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {419--436},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_25},
  doi          = {10.1007/978-3-642-11799-2\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FuchsbauerKN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldenbergL10,
  author       = {David Goldenberg and
                  Moses D. Liskov},
  editor       = {Daniele Micciancio},
  title        = {On Related-Secret Pseudorandomness},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {255--272},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_16},
  doi          = {10.1007/978-3-642-11799-2\_16},
  timestamp    = {Fri, 25 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoldenbergL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GordonIMOS10,
  author       = {S. Dov Gordon and
                  Yuval Ishai and
                  Tal Moran and
                  Rafail Ostrovsky and
                  Amit Sahai},
  editor       = {Daniele Micciancio},
  title        = {On Complete Primitives for Fairness},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_7},
  doi          = {10.1007/978-3-642-11799-2\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GordonIMOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalISVW10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Amit Sahai and
                  Ramarathnam Venkatesan and
                  Akshay Wadia},
  editor       = {Daniele Micciancio},
  title        = {Founding Cryptography on Tamper-Proof Hardware Tokens},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {308--326},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_19},
  doi          = {10.1007/978-3-642-11799-2\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalISVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Gradwohl10,
  author       = {Ronen Gradwohl},
  editor       = {Daniele Micciancio},
  title        = {Rationality in the Full-Information Model},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {401--418},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_24},
  doi          = {10.1007/978-3-642-11799-2\_24},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Gradwohl10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HastadPWP10,
  author       = {Johan H{\aa}stad and
                  Rafael Pass and
                  Douglas Wikstr{\"{o}}m and
                  Krzysztof Pietrzak},
  editor       = {Daniele Micciancio},
  title        = {An Efficient Parallel Repetition Theorem},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_1},
  doi          = {10.1007/978-3-642-11799-2\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HastadPWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Ishai10,
  author       = {Yuval Ishai},
  editor       = {Daniele Micciancio},
  title        = {Secure Computation and Its Diverse Applications},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {90},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_6},
  doi          = {10.1007/978-3-642-11799-2\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Ishai10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Jutla10,
  author       = {Charanjit S. Jutla},
  editor       = {Daniele Micciancio},
  title        = {Almost Optimal Bounds for Direct Product Threshold Theorem},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {37--51},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_3},
  doi          = {10.1007/978-3-642-11799-2\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Jutla10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Kolesnikov10,
  author       = {Vladimir Kolesnikov},
  editor       = {Daniele Micciancio},
  title        = {Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof
                  Tokens},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {327--342},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_20},
  doi          = {10.1007/978-3-642-11799-2\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Kolesnikov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LewkoW10,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Daniele Micciancio},
  title        = {New Techniques for Dual System Encryption and Fully Secure {HIBE}
                  with Short Ciphertexts},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {455--479},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_27},
  doi          = {10.1007/978-3-642-11799-2\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LewkoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LibertY10,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung},
  editor       = {Daniele Micciancio},
  title        = {Concise Mercurial Vector Commitments and Independent Zero-Knowledge
                  Sets with Short Proofs},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {499--517},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_30},
  doi          = {10.1007/978-3-642-11799-2\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LibertY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LyubashevskyPS10,
  author       = {Vadim Lyubashevsky and
                  Adriana Palacio and
                  Gil Segev},
  editor       = {Daniele Micciancio},
  title        = {Public-Key Cryptographic Primitives Provably as Secure as Subset Sum},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {382--400},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_23},
  doi          = {10.1007/978-3-642-11799-2\_23},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LyubashevskyPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MaurerT10,
  author       = {Ueli M. Maurer and
                  Stefano Tessaro},
  editor       = {Daniele Micciancio},
  title        = {A Hardcore Lemma for Computational Indistinguishability: Security
                  Amplification for Arbitrarily Weak PRGs with Optimal Stretch},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {237--254},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_15},
  doi          = {10.1007/978-3-642-11799-2\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MaurerT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/OstrovskyPV10,
  author       = {Rafail Ostrovsky and
                  Omkant Pandey and
                  Ivan Visconti},
  editor       = {Daniele Micciancio},
  title        = {Efficiency Preserving Transformations for Concurrent Non-malleable
                  Zero Knowledge},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {535--552},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_32},
  doi          = {10.1007/978-3-642-11799-2\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/OstrovskyPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PassTV10,
  author       = {Rafael Pass and
                  Wei{-}Lung Dustin Tseng and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Daniele Micciancio},
  title        = {Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing
                  Model},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {518--534},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_31},
  doi          = {10.1007/978-3-642-11799-2\_31},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PassTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PassV10,
  author       = {Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Daniele Micciancio},
  title        = {Private Coins versus Public Coins in Zero-Knowledge Proof Systems},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {588--605},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_35},
  doi          = {10.1007/978-3-642-11799-2\_35},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PassV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Vahlis10,
  author       = {Yevgeniy Vahlis},
  editor       = {Daniele Micciancio},
  title        = {Two Is a Crowd? {A} Black-Box Separation of One-Wayness and Security
                  under Correlated Inputs},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {165--182},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_11},
  doi          = {10.1007/978-3-642-11799-2\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Vahlis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2010,
  editor       = {Daniele Micciancio},
  title        = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2},
  doi          = {10.1007/978-3-642-11799-2},
  isbn         = {978-3-642-11798-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics