Search dblp for Publications

export results for "toc:db/conf/tcc/tcc2018-1.bht:"

 download as .bib file

@inproceedings{DBLP:conf/tcc/AgrawalKW18,
  author       = {Shashank Agrawal and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Impossibility of Simulation Secure Functional Encryption Even with
                  Random Oracles},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {659--688},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_24},
  doi          = {10.1007/978-3-030-03807-6\_24},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ApplebaumA18,
  author       = {Benny Applebaum and
                  Barak Arkis},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {On the Power of Amortization in Secret Sharing: d-Uniform Secret Sharing
                  and {CDS} with Constant Information Rate},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {317--344},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_12},
  doi          = {10.1007/978-3-030-03807-6\_12},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/ApplebaumA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ApplebaumBT18,
  author       = {Benny Applebaum and
                  Zvika Brakerski and
                  Rotem Tsabary},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Perfect Secure Computation in Two Rounds},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {152--174},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_6},
  doi          = {10.1007/978-3-030-03807-6\_6},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/ApplebaumBT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BadrinarayananK18,
  author       = {Saikrishna Badrinarayanan and
                  Dakshita Khurana and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Upgrading to Functional Encryption},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {629--658},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_23},
  doi          = {10.1007/978-3-030-03807-6\_23},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BadrinarayananK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BenhamoudaLPV18,
  author       = {Fabrice Benhamouda and
                  Huijia Lin and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {175--205},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_7},
  doi          = {10.1007/978-3-030-03807-6\_7},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BenhamoudaLPV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyL18,
  author       = {Nir Bitansky and
                  Huijia Lin},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {One-Message Zero Knowledge and Non-malleable Commitments},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {209--234},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_8},
  doi          = {10.1007/978-3-030-03807-6\_8},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BitanskyL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiL18,
  author       = {Ran Canetti and
                  Amit Lichtenberg},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Certifying Trapdoor Permutations, Revisited},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {476--506},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_18},
  doi          = {10.1007/978-3-030-03807-6\_18},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChongchitmateO18,
  author       = {Wutichai Chongchitmate and
                  Rafail Ostrovsky},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Information-Theoretic Broadcast with Dishonest Majority for Long Messages},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {370--388},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_14},
  doi          = {10.1007/978-3-030-03807-6\_14},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/ChongchitmateO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChungGLPS18,
  author       = {Kai{-}Min Chung and
                  Yue Guo and
                  Wei{-}Kai Lin and
                  Rafael Pass and
                  Elaine Shi},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Game Theoretic Notions of Fairness in Multi-party Coin Toss},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {563--596},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_21},
  doi          = {10.1007/978-3-030-03807-6\_21},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChungGLPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DryjaLP18,
  author       = {Thaddeus Dryja and
                  Quanquan C. Liu and
                  Sunoo Park},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {33--66},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_2},
  doi          = {10.1007/978-3-030-03807-6\_2},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DryjaLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargHMR18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Registration-Based Encryption: Removing Private-Key Generator from
                  {IBE}},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {689--718},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_25},
  doi          = {10.1007/978-3-030-03807-6\_25},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GargHMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargIS18,
  author       = {Sanjam Garg and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Two-Round {MPC:} Information-Theoretic and Black-Box},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {123--151},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_5},
  doi          = {10.1007/978-3-030-03807-6\_5},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GargIS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaitnerMO18,
  author       = {Iftach Haitner and
                  Nikolaos Makriyannis and
                  Eran Omri},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {On the Complexity of Fair Coin Flipping},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {539--562},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_20},
  doi          = {10.1007/978-3-030-03807-6\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HaitnerMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Hajiabadi18,
  author       = {Mohammad Hajiabadi},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Enhancements are Blackbox Non-trivial: Impossibility of Enhanced Trapdoor
                  Permutations from Standard Trapdoor Permutations},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {448--475},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_17},
  doi          = {10.1007/978-3-030-03807-6\_17},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Hajiabadi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayV18,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way
                  Permutations},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {263--285},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_10},
  doi          = {10.1007/978-3-030-03807-6\_10},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JostMR18,
  author       = {Daniel Jost and
                  Ueli Maurer and
                  Jo{\~{a}}o L. Ribeiro},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Information-Theoretic Secret-Key Agreement: The Asymptotically Tight
                  Relation Between the Secret-Key Rate and the Channel Quality Ratio},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {345--369},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_13},
  doi          = {10.1007/978-3-030-03807-6\_13},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/JostMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Jutla018,
  author       = {Charanjit S. Jutla and
                  Arnab Roy},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Smooth {NIZK} Arguments},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {235--262},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_9},
  doi          = {10.1007/978-3-030-03807-6\_9},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Jutla018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KhuranaOS18,
  author       = {Dakshita Khurana and
                  Rafail Ostrovsky and
                  Akshayaram Srinivasan},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Round Optimal Black-Box "Commit-and-Prove"},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {286--313},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_11},
  doi          = {10.1007/978-3-030-03807-6\_11},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KhuranaOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Kiyoshima18,
  author       = {Susumu Kiyoshima},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {No-signaling Linear PCPs},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {67--97},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_3},
  doi          = {10.1007/978-3-030-03807-6\_3},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Kiyoshima18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Liu18,
  author       = {Tianren Liu},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {On Basing Search {SIVP} on NP-Hardness},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {98--119},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_4},
  doi          = {10.1007/978-3-030-03807-6\_4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Liu18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MorganP18,
  author       = {Andrew Morgan and
                  Rafael Pass},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {On the Security Loss of Unique Signatures},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {507--536},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_19},
  doi          = {10.1007/978-3-030-03807-6\_19},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MorganP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MorganP18a,
  author       = {Andrew Morgan and
                  Rafael Pass},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Achieving Fair Treatment in Algorithmic Classification},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {597--625},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_22},
  doi          = {10.1007/978-3-030-03807-6\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MorganP18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/NarayananP18,
  author       = {Varun Narayanan and
                  Vinod M. Prabhakaran},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Oblivious Transfer in Incomplete Networks},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {389--418},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_15},
  doi          = {10.1007/978-3-030-03807-6\_15},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/NarayananP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/RotemS18,
  author       = {Lior Rotem and
                  Gil Segev},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Injective Trapdoor Functions via Derandomization: How Strong is Rudich's
                  Black-Box Barrier?},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {421--447},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_16},
  doi          = {10.1007/978-3-030-03807-6\_16},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/RotemS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/TessaroT18,
  author       = {Stefano Tessaro and
                  Aishwarya Thiruvengadam},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Provable Time-Memory Trade-Offs: Symmetric Cryptography Against Memory-Bounded
                  Adversaries},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_1},
  doi          = {10.1007/978-3-030-03807-6\_1},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/TessaroT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2018-1,
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6},
  doi          = {10.1007/978-3-030-03807-6},
  isbn         = {978-3-030-03806-9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics