International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=15544
Nishanth Chandran Vipul Goyal Amit Sahai
Eurocrypt 2008
New Constructions for UC Secure Computation using Tamper-proof Hardware
Eprint
https://eprint.iacr.org/2007/334
Nishanth Chandran Vipul Goyal Amit Sahai
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. Unfortunately it was shown that in the so called...
last revised 7 Oct 2010
Eurocrypt 2008
https://iacr.org/archive/eurocrypt2008/etmp.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project EUROCRYPT 2008: Istanbul, Turkey Nigel P. Smart (Ed.): Advances in Cryptology - EUROCRYPT 2008, 27th Annual International...
EUROCRYPT 2008
https://iacr.org/conferences/eurocrypt2008/accepted_papers.html
Home Program Rump Session FAQ Submission Guidelines Submission Call for Papers Accepted Papers Registration Hotel Accommodation & Transfer Conference Excursion Tour Alternatives Venue General & Travel Information Sponsors...
Eurocrypt 2008
https://iacr.org/archive/eurocrypt2008/eurocrypt2008.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project EUROCRYPT 2008: Istanbul, Turkey Nigel P. Smart (Ed.): Advances in Cryptology - EUROCRYPT 2008, 27th Annual International...
TCC 2011
https://iacr.org/workshops/tcc2011/program.html
Eighth IACR Theory of Cryptography Conference TCC 2011 March 28-30, 2011, Brown University Providence , Rhode Island , USA This page requires iframes. Preliminary Program (All the talks will be held at MacMillan Hall ) Sunday,...
TCC 2011
https://iacr.org/workshops/tcc2011/accepted.html
Eighth IACR Theory of Cryptography Conference TCC 2011 March 28-30, 2011, Brown University Providence, Rhode Island, USA This page requires iframes. TCC 2011 Accepted Papers Secure Two-Party Computation via Cut-and-Choose...
TCC 2011
https://iacr.org/workshops/tcc2011/accepted-dec14.html
Eighth IACR Theory of Cryptography Conference TCC 2011 March 28-30, 2011, Brown University Providence, Rhode Island, USA This page requires iframes. TCC 2011 Accepted Papers Secure Two-Party Computation via Cut-and-Choose...
IACR TCC 2011
https://iacr.org/archive/tcc2011/tcc2011-index.html
TCC 2011: Yuval Ishai (Eds.): Theory of Cryptography - 8th Theory of Cryptography Conference - TCC 2011, TCC 2011, Providence, RI, USA, March 28-30, 2011 Proceedings. TCC 2011 Providence, RI, USA, March 28-30, 2011 Preface by...
Founding Cryptography on Tamper-Proof Hardware Tokens
Eprint
https://eprint.iacr.org/2010/153
Vipul Goyal Yuval Ishai Amit Sahai Ramarathnam Venkatesan Akshay Wadia
A number of works have investigated using tamper-proof hardwaretokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the goal of software protection via oblivious RAM....
received 22 Mar 2010
IACR TCC 2013
https://iacr.org/archive/tcc2013/tcc2013-index.html
TCC 2013: Amit Sahai (Ed.): Theory of Cryptography - 10th Theory of Cryptography Conference - TCC 2013, Tokyo, Japan, March 3-6, 2013 Proceedings. TCC 2013 Tokyo, Japan, March 3-6, 2013 Preface by Amit Sahai (Ed.):...
Founding Cryptography on Tamper-Proof Hardware Tokens
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=18757
Vipul Goyal Yuval Ishai Amit Sahai Ramarathnam Venkatesan Akshay Wadia
Tcc 2010
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Eprint
https://eprint.iacr.org/2010/089
Vipul Goyal Yuval Ishai Mohammad Mahmoody Amit Sahai
Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs for $NP$. We show that such protocols exist in...
received 18 Feb 2010
TCC 2010
https://iacr.org/workshops/tcc2010/index.program.html
Seventh IACR Theory of Cryptography Conference TCC 2010 February 9-11, 2010, ETH Zurich Zurich, Switzerland Home Call for Papers Program Registration Venue Pictures TCC 2010 Program The list of accepted papers can be found...
IACR tcc 2010
https://iacr.org/archive/tcc2010/tcc2010.html
TCC 2010: Daniele Micciancio (Ed.): Theory of Cryptography - TCC 2010, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 Proceedings. TCC 2010 TCC 2010, Zurich, Switzerland, February...
Composable Security in the Tamper Proof Hardware Model under Minimal Complexity
Eprint
https://eprint.iacr.org/2015/887
Carmit Hazay Antigoni Polychroniadou Muthuramakrishnan Venkitasubramaniam
We put forth a new formulation of tamper-proof hardware in the Global Universal Composable (GUC) framework introduced by Canetti et al. in TCC 2007. Almost all of the previous works rely on the formulation by Katz in Eurocrypt...
last revised 1 Sep 2016
TCC 2010
https://iacr.org/workshops/tcc2010/index.accp.html
Seventh IACR Theory of Cryptography Conference TCC 2010 February 9-11, 2010, ETH Zurich Zurich, Switzerland Home Call for Papers Program Registration Venue Pictures Accepted Papers A Domain Extender for the Ideal Cipher...
IACR crypto 2011
https://iacr.org/archive/crypto2011/crypto2011-index.html
CRYPTO 2011: Phillip Rogaway (Ed.): Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011 Proceedings. CRYPTO 2011 Preface by Phillip Rogaway (Ed.): Organizational...
IACR Eurocrypt 2008, Author Index
https://iacr.org/archive/eurocrypt2008/authors.html
Andreeva, Elena, 268 Barak, Boaz, 339 Bernstein, Daniel J., 70 Bertoni, Guido, 180 Biham, Eli, 1 Bouillaguet, Charles, 268 Canetti, Ran, 486 Cash, David, 126 Catalano, Dario, 430 Chandran, Nishanth, 542 Chen, Hao, 448 Cramer,...
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=15553
Tal Moran Gil Segev
Eurocrypt 2008
Next ►