Search dblp for Publications

export results for "toc:db/conf/tcc/tcc2007.bht:"

 download as .bib file

@inproceedings{DBLP:conf/tcc/AbdallaBVS07,
  author       = {Michel Abdalla and
                  Jens{-}Matthias Bohli and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Rainer Steinwandt},
  editor       = {Salil P. Vadhan},
  title        = {(Password) Authenticated Key Establishment: From 2-Party to Group},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {499--514},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_27},
  doi          = {10.1007/978-3-540-70936-7\_27},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AbdallaBVS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AbeF07,
  author       = {Masayuki Abe and
                  Serge Fehr},
  editor       = {Salil P. Vadhan},
  title        = {Perfect {NIZK} with Adaptive Soundness},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {118--136},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_7},
  doi          = {10.1007/978-3-540-70936-7\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AbeF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AdidaW07,
  author       = {Ben Adida and
                  Douglas Wikstr{\"{o}}m},
  editor       = {Salil P. Vadhan},
  title        = {How to Shuffle in Public},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {555--574},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_30},
  doi          = {10.1007/978-3-540-70936-7\_30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AdidaW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AumannL07,
  author       = {Yonatan Aumann and
                  Yehuda Lindell},
  editor       = {Salil P. Vadhan},
  title        = {Security Against Covert Adversaries: Efficient Protocols for Realistic
                  Adversaries},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {137--156},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_8},
  doi          = {10.1007/978-3-540-70936-7\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AumannL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BackesMU07,
  author       = {Michael Backes and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominique Unruh},
  editor       = {Salil P. Vadhan},
  title        = {On the Necessity of Rewinding in Secure Multiparty Computation},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {157--173},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_9},
  doi          = {10.1007/978-3-540-70936-7\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BackesMU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BeimelF07,
  author       = {Amos Beimel and
                  Matthew K. Franklin},
  editor       = {Salil P. Vadhan},
  title        = {Weakly-Private Secret Sharing Schemes},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {253--272},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_14},
  doi          = {10.1007/978-3-540-70936-7\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BeimelF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BeimelHN07,
  author       = {Amos Beimel and
                  Renen Hallak and
                  Kobbi Nissim},
  editor       = {Salil P. Vadhan},
  title        = {Private Approximation of Clustering and Vertex Cover},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {383--403},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_21},
  doi          = {10.1007/978-3-540-70936-7\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BeimelHN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BonehW07,
  author       = {Dan Boneh and
                  Brent Waters},
  editor       = {Salil P. Vadhan},
  title        = {Conjunctive, Subset, and Range Queries on Encrypted Data},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {535--554},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_29},
  doi          = {10.1007/978-3-540-70936-7\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BonehW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BosleyD07,
  author       = {Carl Bosley and
                  Yevgeniy Dodis},
  editor       = {Salil P. Vadhan},
  title        = {Does Privacy Require True Randomness?},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_1},
  doi          = {10.1007/978-3-540-70936-7\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BosleyD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiDPW07,
  author       = {Ran Canetti and
                  Yevgeniy Dodis and
                  Rafael Pass and
                  Shabsi Walfish},
  editor       = {Salil P. Vadhan},
  title        = {Universally Composable Security with Global Setup},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {61--85},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_4},
  doi          = {10.1007/978-3-540-70936-7\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiDPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CashDDLLW07,
  author       = {David Cash and
                  Yan Zong Ding and
                  Yevgeniy Dodis and
                  Wenke Lee and
                  Richard J. Lipton and
                  Shabsi Walfish},
  editor       = {Salil P. Vadhan},
  title        = {Intrusion-Resilient Key Exchange in the Bounded Retrieval Model},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {479--498},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_26},
  doi          = {10.1007/978-3-540-70936-7\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CashDDLLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Chase07,
  author       = {Melissa Chase},
  editor       = {Salil P. Vadhan},
  title        = {Multi-authority Attribute Based Encryption},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {515--534},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_28},
  doi          = {10.1007/978-3-540-70936-7\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Chase07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChristandlEHHOR07,
  author       = {Matthias Christandl and
                  Artur Ekert and
                  Michal Horodecki and
                  Pawel Horodecki and
                  Jonathan Oppenheim and
                  Renato Renner},
  editor       = {Salil P. Vadhan},
  title        = {Unifying Classical and Quantum Key Distillation},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {456--478},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_25},
  doi          = {10.1007/978-3-540-70936-7\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChristandlEHHOR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FitziFGV07,
  author       = {Matthias Fitzi and
                  Matthew K. Franklin and
                  Juan A. Garay and
                  Harsha Vardhan Simhadri},
  editor       = {Salil P. Vadhan},
  title        = {Towards Optimal and Efficient Perfectly Secure Message Transmission},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {311--322},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_17},
  doi          = {10.1007/978-3-540-70936-7\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FitziFGV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GertnerMM07,
  author       = {Yael Gertner and
                  Tal Malkin and
                  Steven A. Myers},
  editor       = {Salil P. Vadhan},
  title        = {Towards a Separation of Semantic and {CCA} Security for Public Key
                  Encryption},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {434--455},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_24},
  doi          = {10.1007/978-3-540-70936-7\_24},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GertnerMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Goldreich07,
  author       = {Oded Goldreich},
  editor       = {Salil P. Vadhan},
  title        = {On Expected Probabilistic Polynomial-Time Adversaries: {A} Suggestion
                  for Restricted Definitions and Their Benefits},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {174--193},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_10},
  doi          = {10.1007/978-3-540-70936-7\_10},
  timestamp    = {Wed, 15 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Goldreich07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserR07,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum},
  editor       = {Salil P. Vadhan},
  title        = {On Best-Possible Obfuscation},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {194--213},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_11},
  doi          = {10.1007/978-3-540-70936-7\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoldwasserR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayKKL07,
  author       = {Carmit Hazay and
                  Jonathan Katz and
                  Chiu{-}Yuen Koo and
                  Yehuda Lindell},
  editor       = {Salil P. Vadhan},
  title        = {Concurrently-Secure Blind Signatures Without Random Oracles or Setup
                  Assumptions},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {323--341},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_18},
  doi          = {10.1007/978-3-540-70936-7\_18},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayKKL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HofheinzMS07,
  author       = {Dennis Hofheinz and
                  John Malone{-}Lee and
                  Martijn Stam},
  editor       = {Salil P. Vadhan},
  title        = {Obfuscation for Cryptographic Purposes},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {214--232},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_12},
  doi          = {10.1007/978-3-540-70936-7\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HofheinzMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HohenbergerRSV07,
  author       = {Susan Hohenberger and
                  Guy N. Rothblum and
                  Abhi Shelat and
                  Vinod Vaikuntanathan},
  editor       = {Salil P. Vadhan},
  title        = {Securely Obfuscating Re-encryption},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {233--252},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_13},
  doi          = {10.1007/978-3-540-70936-7\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HohenbergerRSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HopperMW07,
  author       = {Nicholas Hopper and
                  David Molnar and
                  David A. Wagner},
  editor       = {Salil P. Vadhan},
  title        = {From Weak to Strong Watermarking},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {362--382},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_20},
  doi          = {10.1007/978-3-540-70936-7\_20},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HopperMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiP07,
  author       = {Yuval Ishai and
                  Anat Paskin},
  editor       = {Salil P. Vadhan},
  title        = {Evaluating Branching Programs on Encrypted Data},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {575--594},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_31},
  doi          = {10.1007/978-3-540-70936-7\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KiltzMWF07,
  author       = {Eike Kiltz and
                  Payman Mohassel and
                  Enav Weinreb and
                  Matthew K. Franklin},
  editor       = {Salil P. Vadhan},
  title        = {Secure Linear Algebra Using Linearly Recurrent Sequences},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {291--310},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_16},
  doi          = {10.1007/978-3-540-70936-7\_16},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KiltzMWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Marti-FarreP07,
  author       = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and
                  Carles Padr{\'{o}}},
  editor       = {Salil P. Vadhan},
  title        = {On Secret Sharing Schemes, Matroids and Polymatroids},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {273--290},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_15},
  doi          = {10.1007/978-3-540-70936-7\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Marti-FarreP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MeierPW07,
  author       = {Remo Meier and
                  Bartosz Przydatek and
                  J{\"{u}}rg Wullschleger},
  editor       = {Salil P. Vadhan},
  title        = {Robuster Combiners for Oblivious Transfer},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {404--418},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_22},
  doi          = {10.1007/978-3-540-70936-7\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MeierPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Muller-QuadeU07,
  author       = {J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominique Unruh},
  editor       = {Salil P. Vadhan},
  title        = {Long-Term Security and Universal Composability},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_3},
  doi          = {10.1007/978-3-540-70936-7\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Muller-QuadeU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Panjwani07,
  author       = {Saurabh Panjwani},
  editor       = {Salil P. Vadhan},
  title        = {Tackling Adaptive Corruptions in Multicast Encryption Protocols},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_2},
  doi          = {10.1007/978-3-540-70936-7\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Panjwani07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PietrzakW07,
  author       = {Krzysztof Pietrzak and
                  Douglas Wikstr{\"{o}}m},
  editor       = {Salil P. Vadhan},
  title        = {Parallel Repetition of Computationally Sound Protocols Revisited},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {86--102},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_5},
  doi          = {10.1007/978-3-540-70936-7\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PietrzakW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Wee07,
  author       = {Hoeteck Wee},
  editor       = {Salil P. Vadhan},
  title        = {Lower Bounds for Non-interactive Zero-Knowledge},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {103--117},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_6},
  doi          = {10.1007/978-3-540-70936-7\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Wee07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Wee07a,
  author       = {Hoeteck Wee},
  editor       = {Salil P. Vadhan},
  title        = {One-Way Permutations, Interactive Hashing and Statistically Hiding
                  Commitments},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {419--433},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_23},
  doi          = {10.1007/978-3-540-70936-7\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Wee07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Wikstrom07,
  author       = {Douglas Wikstr{\"{o}}m},
  editor       = {Salil P. Vadhan},
  title        = {Designated Confirmer Signatures Revisited},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {342--361},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_19},
  doi          = {10.1007/978-3-540-70936-7\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Wikstrom07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2007,
  editor       = {Salil P. Vadhan},
  title        = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7},
  doi          = {10.1007/978-3-540-70936-7},
  isbn         = {3-540-70935-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics