Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/tcc/tcc2016b1.bht:"
@inproceedings{DBLP:conf/tcc/AlonO16, author = {Bar Alon and Eran Omri}, editor = {Martin Hirt and Adam D. Smith}, title = {Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {307--335}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_13}, doi = {10.1007/978-3-662-53641-4\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AlonO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ApplebaumR16a, author = {Benny Applebaum and Pavel Raykov}, editor = {Martin Hirt and Adam D. Smith}, title = {Fast Pseudorandom Functions Based on Expander Graphs}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {27--56}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_2}, doi = {10.1007/978-3-662-53641-4\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ApplebaumR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BaumOS16, author = {Carsten Baum and Emmanuela Orsini and Peter Scholl}, editor = {Martin Hirt and Adam D. Smith}, title = {Efficient Secure Multiparty Computation with Identifiable Abort}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {461--490}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_18}, doi = {10.1007/978-3-662-53641-4\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BaumOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BitanskyBKPV16, author = {Nir Bitansky and Zvika Brakerski and Yael Tauman Kalai and Omer Paneth and Vinod Vaikuntanathan}, editor = {Martin Hirt and Adam D. Smith}, title = {3-Message Zero Knowledge Against Human Ignorance}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {57--83}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_3}, doi = {10.1007/978-3-662-53641-4\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BitanskyBKPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BunCV16, author = {Mark Bun and Yi{-}Hsiu Chen and Salil P. Vadhan}, editor = {Martin Hirt and Adam D. Smith}, title = {Separating Computational and Statistical Differential Privacy in the Client-Server Model}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {607--634}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_23}, doi = {10.1007/978-3-662-53641-4\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BunCV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BunS16, author = {Mark Bun and Thomas Steinke}, editor = {Martin Hirt and Adam D. Smith}, title = {Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {635--658}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_24}, doi = {10.1007/978-3-662-53641-4\_24}, timestamp = {Sun, 14 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BunS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CascudoDLR16, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Felipe Lacerda and Samuel Ranellucci}, editor = {Martin Hirt and Adam D. Smith}, title = {Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key Agreement}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {204--234}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_9}, doi = {10.1007/978-3-662-53641-4\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CascudoDLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CohenK16, author = {Aloni Cohen and Saleet Klein}, editor = {Martin Hirt and Adam D. Smith}, title = {The {GGM} Function Family Is a Weakly One-Way Family of Functions}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {84--107}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_4}, doi = {10.1007/978-3-662-53641-4\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CohenK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FioreN16, author = {Dario Fiore and Anca Nitulescu}, editor = {Martin Hirt and Adam D. Smith}, title = {On the (In)Security of SNARKs in the Presence of Oracles}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {108--138}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_5}, doi = {10.1007/978-3-662-53641-4\_5}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FioreN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Garg0MP16, author = {Sanjam Garg and Divya Gupta and Peihan Miao and Omkant Pandey}, editor = {Martin Hirt and Adam D. Smith}, title = {Secure Multiparty {RAM} Computation in Constant Rounds}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {491--520}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_19}, doi = {10.1007/978-3-662-53641-4\_19}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Garg0MP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GenkinIW16, author = {Daniel Genkin and Yuval Ishai and Mor Weiss}, editor = {Martin Hirt and Adam D. Smith}, title = {Binary {AMD} Circuits from Secure Multiparty Computation}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {336--366}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_14}, doi = {10.1007/978-3-662-53641-4\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GenkinIW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayPV16, author = {Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, editor = {Martin Hirt and Adam D. Smith}, title = {Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {367--399}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_15}, doi = {10.1007/978-3-662-53641-4\_15}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HazayPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayV16, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Martin Hirt and Adam D. Smith}, title = {Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {400--432}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_16}, doi = {10.1007/978-3-662-53641-4\_16}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HazayV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayY16, author = {Carmit Hazay and Avishay Yanai}, editor = {Martin Hirt and Adam D. Smith}, title = {Constant-Round Maliciously Secure Two-Party Computation in the {RAM} Model}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {521--553}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_20}, doi = {10.1007/978-3-662-53641-4\_20}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HazayY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ImpagliazzoJKKK16, author = {Russell Impagliazzo and Ragesh Jaiswal and Valentine Kabanets and Bruce M. Kapron and Valerie King and Stefano Tessaro}, editor = {Martin Hirt and Adam D. Smith}, title = {Simultaneous Secrecy and Reliability Amplification for a General Channel Model}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {235--261}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_10}, doi = {10.1007/978-3-662-53641-4\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ImpagliazzoJKKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JafargholiW16, author = {Zahra Jafargholi and Daniel Wichs}, editor = {Martin Hirt and Adam D. Smith}, title = {Adaptive Security of Yao's Garbled Circuits}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {433--458}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_17}, doi = {10.1007/978-3-662-53641-4\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/JafargholiW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Komargodski16, author = {Ilan Komargodski}, editor = {Martin Hirt and Adam D. Smith}, title = {Leakage Resilient One-Way Functions: The Auxiliary-Input Setting}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {139--158}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_6}, doi = {10.1007/978-3-662-53641-4\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Komargodski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KowalczykMUZ16, author = {Lucas Kowalczyk and Tal Malkin and Jonathan R. Ullman and Mark Zhandry}, editor = {Martin Hirt and Adam D. Smith}, title = {Strong Hardness of Privacy from Weak Traitor Tracing}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {659--689}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_25}, doi = {10.1007/978-3-662-53641-4\_25}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KowalczykMUZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LindellSS16, author = {Yehuda Lindell and Nigel P. Smart and Eduardo Soria{-}Vazquez}, editor = {Martin Hirt and Adam D. Smith}, title = {More Efficient Constant-Round Multi-party Computation from {BMR} and {SHE}}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {554--581}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_21}, doi = {10.1007/978-3-662-53641-4\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LindellSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MaurerR16, author = {Ueli Maurer and Renato Renner}, editor = {Martin Hirt and Adam D. Smith}, title = {From Indifferentiability to Constructive Cryptography (and Back)}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {3--24}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_1}, doi = {10.1007/978-3-662-53641-4\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MaurerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/NielsenO16, author = {Jesper Buus Nielsen and Claudio Orlandi}, editor = {Martin Hirt and Adam D. Smith}, title = {Cross and Clean: Amortized Garbled Circuits with Constant Overhead}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {582--603}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_22}, doi = {10.1007/978-3-662-53641-4\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/NielsenO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PietrzakS16, author = {Krzysztof Pietrzak and Maciej Sk{\'{o}}rski}, editor = {Martin Hirt and Adam D. Smith}, title = {Pseudoentropy: Lower-Bounds for Chain Rules and Transformations}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {183--203}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_8}, doi = {10.1007/978-3-662-53641-4\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PietrzakS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/RenD16, author = {Ling Ren and Srinivas Devadas}, editor = {Martin Hirt and Adam D. Smith}, title = {Proof of Space from Stacked Expanders}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {262--285}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_11}, doi = {10.1007/978-3-662-53641-4\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/RenD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Skorski16, author = {Maciej Sk{\'{o}}rski}, editor = {Martin Hirt and Adam D. Smith}, title = {Simulating Auxiliary Inputs, Revisited}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {159--179}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_7}, doi = {10.1007/978-3-662-53641-4\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Skorski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/SpiniZ16, author = {Gabriele Spini and Gilles Z{\'{e}}mor}, editor = {Martin Hirt and Adam D. Smith}, title = {Perfectly Secure Message Transmission in Two Rounds}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {286--304}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_12}, doi = {10.1007/978-3-662-53641-4\_12}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/SpiniZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2016b1, editor = {Martin Hirt and Adam D. Smith}, title = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4}, doi = {10.1007/978-3-662-53641-4}, isbn = {978-3-662-53640-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2016b1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.