Search dblp for Publications

export results for "toc:db/conf/tcc/tcc2016b1.bht:"

 download as .bib file

@inproceedings{DBLP:conf/tcc/AlonO16,
  author       = {Bar Alon and
                  Eran Omri},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters
                  Malicious},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {307--335},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_13},
  doi          = {10.1007/978-3-662-53641-4\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AlonO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ApplebaumR16a,
  author       = {Benny Applebaum and
                  Pavel Raykov},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Fast Pseudorandom Functions Based on Expander Graphs},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {27--56},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_2},
  doi          = {10.1007/978-3-662-53641-4\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ApplebaumR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BaumOS16,
  author       = {Carsten Baum and
                  Emmanuela Orsini and
                  Peter Scholl},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Efficient Secure Multiparty Computation with Identifiable Abort},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {461--490},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_18},
  doi          = {10.1007/978-3-662-53641-4\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BaumOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyBKPV16,
  author       = {Nir Bitansky and
                  Zvika Brakerski and
                  Yael Tauman Kalai and
                  Omer Paneth and
                  Vinod Vaikuntanathan},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {3-Message Zero Knowledge Against Human Ignorance},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {57--83},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_3},
  doi          = {10.1007/978-3-662-53641-4\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BitanskyBKPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BunCV16,
  author       = {Mark Bun and
                  Yi{-}Hsiu Chen and
                  Salil P. Vadhan},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Separating Computational and Statistical Differential Privacy in the
                  Client-Server Model},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {607--634},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_23},
  doi          = {10.1007/978-3-662-53641-4\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BunCV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BunS16,
  author       = {Mark Bun and
                  Thomas Steinke},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Concentrated Differential Privacy: Simplifications, Extensions, and
                  Lower Bounds},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {635--658},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_24},
  doi          = {10.1007/978-3-662-53641-4\_24},
  timestamp    = {Sun, 14 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BunS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CascudoDLR16,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Felipe Lacerda and
                  Samuel Ranellucci},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via
                  Secret Key Agreement},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {204--234},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_9},
  doi          = {10.1007/978-3-662-53641-4\_9},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CascudoDLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CohenK16,
  author       = {Aloni Cohen and
                  Saleet Klein},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {The {GGM} Function Family Is a Weakly One-Way Family of Functions},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {84--107},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_4},
  doi          = {10.1007/978-3-662-53641-4\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CohenK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FioreN16,
  author       = {Dario Fiore and
                  Anca Nitulescu},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {On the (In)Security of SNARKs in the Presence of Oracles},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {108--138},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_5},
  doi          = {10.1007/978-3-662-53641-4\_5},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FioreN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Garg0MP16,
  author       = {Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Omkant Pandey},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Secure Multiparty {RAM} Computation in Constant Rounds},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {491--520},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_19},
  doi          = {10.1007/978-3-662-53641-4\_19},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Garg0MP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GenkinIW16,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Mor Weiss},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Binary {AMD} Circuits from Secure Multiparty Computation},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {336--366},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_14},
  doi          = {10.1007/978-3-662-53641-4\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GenkinIW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayPV16,
  author       = {Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Composable Security in the Tamper-Proof Hardware Model Under Minimal
                  Complexity},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {367--399},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_15},
  doi          = {10.1007/978-3-662-53641-4\_15},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayV16,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Composable Adaptive Secure Protocols Without Setup Under Polytime
                  Assumptions},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {400--432},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_16},
  doi          = {10.1007/978-3-662-53641-4\_16},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayY16,
  author       = {Carmit Hazay and
                  Avishay Yanai},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Constant-Round Maliciously Secure Two-Party Computation in the {RAM}
                  Model},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {521--553},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_20},
  doi          = {10.1007/978-3-662-53641-4\_20},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ImpagliazzoJKKK16,
  author       = {Russell Impagliazzo and
                  Ragesh Jaiswal and
                  Valentine Kabanets and
                  Bruce M. Kapron and
                  Valerie King and
                  Stefano Tessaro},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Simultaneous Secrecy and Reliability Amplification for a General Channel
                  Model},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {235--261},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_10},
  doi          = {10.1007/978-3-662-53641-4\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ImpagliazzoJKKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JafargholiW16,
  author       = {Zahra Jafargholi and
                  Daniel Wichs},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Adaptive Security of Yao's Garbled Circuits},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {433--458},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_17},
  doi          = {10.1007/978-3-662-53641-4\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/JafargholiW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Komargodski16,
  author       = {Ilan Komargodski},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Leakage Resilient One-Way Functions: The Auxiliary-Input Setting},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {139--158},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_6},
  doi          = {10.1007/978-3-662-53641-4\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Komargodski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KowalczykMUZ16,
  author       = {Lucas Kowalczyk and
                  Tal Malkin and
                  Jonathan R. Ullman and
                  Mark Zhandry},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Strong Hardness of Privacy from Weak Traitor Tracing},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {659--689},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_25},
  doi          = {10.1007/978-3-662-53641-4\_25},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KowalczykMUZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LindellSS16,
  author       = {Yehuda Lindell and
                  Nigel P. Smart and
                  Eduardo Soria{-}Vazquez},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {More Efficient Constant-Round Multi-party Computation from {BMR} and
                  {SHE}},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {554--581},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_21},
  doi          = {10.1007/978-3-662-53641-4\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LindellSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MaurerR16,
  author       = {Ueli Maurer and
                  Renato Renner},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {From Indifferentiability to Constructive Cryptography (and Back)},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {3--24},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_1},
  doi          = {10.1007/978-3-662-53641-4\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MaurerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/NielsenO16,
  author       = {Jesper Buus Nielsen and
                  Claudio Orlandi},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Cross and Clean: Amortized Garbled Circuits with Constant Overhead},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {582--603},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_22},
  doi          = {10.1007/978-3-662-53641-4\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/NielsenO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PietrzakS16,
  author       = {Krzysztof Pietrzak and
                  Maciej Sk{\'{o}}rski},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Pseudoentropy: Lower-Bounds for Chain Rules and Transformations},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {183--203},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_8},
  doi          = {10.1007/978-3-662-53641-4\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PietrzakS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/RenD16,
  author       = {Ling Ren and
                  Srinivas Devadas},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Proof of Space from Stacked Expanders},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {262--285},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_11},
  doi          = {10.1007/978-3-662-53641-4\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/RenD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Skorski16,
  author       = {Maciej Sk{\'{o}}rski},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Simulating Auxiliary Inputs, Revisited},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {159--179},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_7},
  doi          = {10.1007/978-3-662-53641-4\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Skorski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/SpiniZ16,
  author       = {Gabriele Spini and
                  Gilles Z{\'{e}}mor},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Perfectly Secure Message Transmission in Two Rounds},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {286--304},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_12},
  doi          = {10.1007/978-3-662-53641-4\_12},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/SpiniZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b1,
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4},
  doi          = {10.1007/978-3-662-53641-4},
  isbn         = {978-3-662-53640-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2016b1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics