Proceedings of TCC 2006
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings
, Springer
- Concurrent Zero Knowledge Without Complexity Assumptions., Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil P. Vadhan, pp. 1-20
- PDF postscript BibTeX
- Interactive Zero-Knowledge with Restricted Random Oracles., Moti Yung, Yunlei Zhao, pp. 21-40
- PDF postscript BibTeX
- Non-interactive Zero-Knowledge from Homomorphic Encryption., Ivan Damgård, Nelly Fazio, Antonio Nicolosi, pp. 41-59
- PDF postscript BibTeX
- Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles., Adam Bender, Jonathan Katz, Ruggero Morselli, pp. 60-79
- PDF postscript BibTeX
- Efficient Blind and Partially Blind Signatures Without Random Oracles., Tatsuaki Okamoto, pp. 80-99
- PDF postscript BibTeX
- Key Exchange Using Passwords and Long Keys., Vladimir Kolesnikov, Charles Rackoff, pp. 100-119
- PDF postscript BibTeX
- Mercurial Commitments: Minimal Assumptions and Efficient Constructions., Dario Catalano, Yevgeniy Dodis, Ivan Visconti, pp. 120-144
- PDF postscript BibTeX
- Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices., Chris Peikert, Alon Rosen, pp. 145-166
- PDF postscript BibTeX
- On Error Correction in the Exponent., Chris Peikert, pp. 167-183
- PDF postscript BibTeX
- On the Relation Between the Ideal Cipher and the Random Oracle Models., Yevgeniy Dodis, Prashant Puniya, pp. 184-206
- PDF postscript BibTeX
- Intrusion-Resilience Via the Bounded-Storage Model., Stefan Dziembowski, pp. 207-224
- PDF postscript BibTeX
- Perfectly Secure Password Protocols in the Bounded Retrieval Model., Giovanni Di Crescenzo, Richard J. Lipton, Shabsi Walfish, pp. 225-244
- PDF postscript BibTeX
- Polylogarithmic Private Approximations and Efficient Matching., Piotr Indyk, David P. Woodruff, pp. 245-264
- PDF postscript BibTeX
- Calibrating Noise to Sensitivity in Private Data Analysis., Cynthia Dwork, Frank McSherry, Kobbi Nissim, Adam Smith, pp. 265-284
- PDF postscript BibTeX
- Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation., Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft, pp. 285-304
- PDF postscript BibTeX
- Efficient Multi-party Computation with Dispute Control., Zuzana Beerliová-Trubíniová, Martin Hirt, pp. 305-328
- PDF postscript BibTeX
- Round-Optimal and Efficient Verifiable Secret Sharing., Matthias Fitzi, Juan A. Garay, Shyamnath Gollakota, C. Pandu Rangan, K. Srinathan, pp. 329-342
- PDF postscript BibTeX
- Generalized Environmental Security from Number Theoretic Assumptions., Tal Malkin, Ryan Moriarty, Nikolai Yakovenko, pp. 343-359
- PDF postscript BibTeX
- Games and the Impossibility of Realizable Ideal Functionality., Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov, pp. 360-379
- PDF postscript BibTeX
- Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols., Ran Canetti, Jonathan Herzog, pp. 380-403
- PDF postscript BibTeX
- Resource Fairness and Composability of Cryptographic Protocols., Juan A. Garay, Philip D. MacKenzie, Manoj Prabhakaran, Ke Yang, pp. 404-428
- PDF postscript BibTeX
- Finding Pessiland., Hoeteck Wee, pp. 429-442
- PDF postscript BibTeX
- Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness., Thomas Holenstein, pp. 443-461
- PDF postscript BibTeX
- On the Complexity of Parallel Hardness Amplification for One-Way Functions., Chi-Jen Lu, pp. 462-481
- PDF postscript BibTeX
- On Matroids and Non-ideal Secret Sharing., Amos Beimel, Noam Livne, pp. 482-501
- PDF postscript BibTeX
- Secure Computation with Partial Message Loss., Chiu-Yuen Koo, pp. 502-521
- PDF postscript BibTeX
- Communication Efficient Secure Linear Algebra., Kobbi Nissim, Enav Weinreb, pp. 522-541
- PDF postscript BibTeX
- Threshold and Proactive Pseudo-Random Permutations., Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung, pp. 542-560
- PDF postscript BibTeX
- PRF Domain Extension Using DAGs., Charanjit S. Jutla, pp. 561-580
- PDF postscript BibTeX
- Chosen-Ciphertext Security from Tag-Based Encryption., Eike Kiltz, pp. 581-600
- postscript BibTeX
- Separating Sources for Encryption and Secret Sharing., Yevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek, pp. 601-616
- PDF postscript BibTeX
[ IACR home page ]
© IACR