Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/tcc/tcc2018-1.bht:"
@inproceedings{DBLP:conf/tcc/AgrawalKW18, author = {Shashank Agrawal and Venkata Koppula and Brent Waters}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Impossibility of Simulation Secure Functional Encryption Even with Random Oracles}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {659--688}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_24}, doi = {10.1007/978-3-030-03807-6\_24}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ApplebaumA18, author = {Benny Applebaum and Barak Arkis}, editor = {Amos Beimel and Stefan Dziembowski}, title = {On the Power of Amortization in Secret Sharing: d-Uniform Secret Sharing and {CDS} with Constant Information Rate}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {317--344}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_12}, doi = {10.1007/978-3-030-03807-6\_12}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/ApplebaumA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ApplebaumBT18, author = {Benny Applebaum and Zvika Brakerski and Rotem Tsabary}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Perfect Secure Computation in Two Rounds}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {152--174}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_6}, doi = {10.1007/978-3-030-03807-6\_6}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/ApplebaumBT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Upgrading to Functional Encryption}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {629--658}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_23}, doi = {10.1007/978-3-030-03807-6\_23}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BenhamoudaLPV18, author = {Fabrice Benhamouda and Huijia Lin and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {175--205}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_7}, doi = {10.1007/978-3-030-03807-6\_7}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BenhamoudaLPV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BitanskyL18, author = {Nir Bitansky and Huijia Lin}, editor = {Amos Beimel and Stefan Dziembowski}, title = {One-Message Zero Knowledge and Non-malleable Commitments}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {209--234}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_8}, doi = {10.1007/978-3-030-03807-6\_8}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BitanskyL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiL18, author = {Ran Canetti and Amit Lichtenberg}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Certifying Trapdoor Permutations, Revisited}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {476--506}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_18}, doi = {10.1007/978-3-030-03807-6\_18}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/CanettiL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChongchitmateO18, author = {Wutichai Chongchitmate and Rafail Ostrovsky}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Information-Theoretic Broadcast with Dishonest Majority for Long Messages}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {370--388}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_14}, doi = {10.1007/978-3-030-03807-6\_14}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/ChongchitmateO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChungGLPS18, author = {Kai{-}Min Chung and Yue Guo and Wei{-}Kai Lin and Rafael Pass and Elaine Shi}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Game Theoretic Notions of Fairness in Multi-party Coin Toss}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {563--596}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_21}, doi = {10.1007/978-3-030-03807-6\_21}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChungGLPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DryjaLP18, author = {Thaddeus Dryja and Quanquan C. Liu and Sunoo Park}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {33--66}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_2}, doi = {10.1007/978-3-030-03807-6\_2}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DryjaLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargHMR18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Registration-Based Encryption: Removing Private-Key Generator from {IBE}}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {689--718}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_25}, doi = {10.1007/978-3-030-03807-6\_25}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GargHMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargIS18, author = {Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Two-Round {MPC:} Information-Theoretic and Black-Box}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {123--151}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_5}, doi = {10.1007/978-3-030-03807-6\_5}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GargIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaitnerMO18, author = {Iftach Haitner and Nikolaos Makriyannis and Eran Omri}, editor = {Amos Beimel and Stefan Dziembowski}, title = {On the Complexity of Fair Coin Flipping}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {539--562}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_20}, doi = {10.1007/978-3-030-03807-6\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HaitnerMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Hajiabadi18, author = {Mohammad Hajiabadi}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Enhancements are Blackbox Non-trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {448--475}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_17}, doi = {10.1007/978-3-030-03807-6\_17}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Hajiabadi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayV18, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {263--285}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_10}, doi = {10.1007/978-3-030-03807-6\_10}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HazayV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JostMR18, author = {Daniel Jost and Ueli Maurer and Jo{\~{a}}o L. Ribeiro}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {345--369}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_13}, doi = {10.1007/978-3-030-03807-6\_13}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/JostMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Jutla018, author = {Charanjit S. Jutla and Arnab Roy}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Smooth {NIZK} Arguments}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {235--262}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_9}, doi = {10.1007/978-3-030-03807-6\_9}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Jutla018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KhuranaOS18, author = {Dakshita Khurana and Rafail Ostrovsky and Akshayaram Srinivasan}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Round Optimal Black-Box "Commit-and-Prove"}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {286--313}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_11}, doi = {10.1007/978-3-030-03807-6\_11}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KhuranaOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Kiyoshima18, author = {Susumu Kiyoshima}, editor = {Amos Beimel and Stefan Dziembowski}, title = {No-signaling Linear PCPs}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {67--97}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_3}, doi = {10.1007/978-3-030-03807-6\_3}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Kiyoshima18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Liu18, author = {Tianren Liu}, editor = {Amos Beimel and Stefan Dziembowski}, title = {On Basing Search {SIVP} on NP-Hardness}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {98--119}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_4}, doi = {10.1007/978-3-030-03807-6\_4}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Liu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MorganP18, author = {Andrew Morgan and Rafael Pass}, editor = {Amos Beimel and Stefan Dziembowski}, title = {On the Security Loss of Unique Signatures}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {507--536}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_19}, doi = {10.1007/978-3-030-03807-6\_19}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MorganP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MorganP18a, author = {Andrew Morgan and Rafael Pass}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Achieving Fair Treatment in Algorithmic Classification}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {597--625}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_22}, doi = {10.1007/978-3-030-03807-6\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MorganP18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/NarayananP18, author = {Varun Narayanan and Vinod M. Prabhakaran}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Oblivious Transfer in Incomplete Networks}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {389--418}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_15}, doi = {10.1007/978-3-030-03807-6\_15}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/NarayananP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/RotemS18, author = {Lior Rotem and Gil Segev}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Injective Trapdoor Functions via Derandomization: How Strong is Rudich's Black-Box Barrier?}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {421--447}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_16}, doi = {10.1007/978-3-030-03807-6\_16}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/RotemS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/TessaroT18, author = {Stefano Tessaro and Aishwarya Thiruvengadam}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Provable Time-Memory Trade-Offs: Symmetric Cryptography Against Memory-Bounded Adversaries}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {3--32}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_1}, doi = {10.1007/978-3-030-03807-6\_1}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/TessaroT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2018-1, editor = {Amos Beimel and Stefan Dziembowski}, title = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6}, doi = {10.1007/978-3-030-03807-6}, isbn = {978-3-030-03806-9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.