What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from TCC 2009
Year
Venue
Title
2009
TCC
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
Yehuda Lindell
Hila Zarosim
2009
TCC
An Optimally Fair Coin Toss
Tal Moran
Moni Naor
Gil Segev
2009
TCC
Authenticated Adversarial Routing
Yair Amir
Paul Bunn
Rafail Ostrovsky
2009
TCC
Black-Box Constructions of Two-Party Protocols from One-Way Functions
Rafael Pass
Hoeteck Wee
2009
TCC
Chosen-Ciphertext Security via Correlated Products
Alon Rosen
Gil Segev
2009
TCC
Complete Fairness in Multi-party Computation without an Honest Majority
S. Dov Gordon
Jonathan Katz
2009
TCC
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
Hemanta K. Maji
Manoj Prabhakaran
Mike Rosulek
2009
TCC
Composability and On-Line Deniability of Authentication
Yevgeniy Dodis
Jonathan Katz
Adam Smith
Shabsi Walfish
2009
TCC
Composing Quantum Protocols in a Classical Environment
Serge Fehr
Christian Schaffner
2009
TCC
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
Stanislaw Jarecki
Xiaomin Liu
2009
TCC
Fairness with an Honest Minority and a Rational Majority
Shien Jin Ong
David C. Parkes
Alon Rosen
Salil P. Vadhan
2009
TCC
Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms
James Cook
Omid Etesami
Rachel Miller
Luca Trevisan
2009
TCC
Hierarchical Identity Based Encryption with Polynomially Many Levels
Craig Gentry
Shai Halevi
2009
TCC
How Efficient Can Memory Checking Be?
Cynthia Dwork
Moni Naor
Guy N. Rothblum
Vinod Vaikuntanathan
2009
TCC
LEGO for Two-Party Secure Computation
Jesper Buus Nielsen
Claudio Orlandi
2009
TCC
Non-malleable Obfuscation
Ran Canetti
Mayank Varia
2009
TCC
Oblivious Transfer from Weak Noisy Channels
Jürg Wullschleger
2009
TCC
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols
Iftach Haitner
Alon Rosen
Ronen Shaltiel
2009
TCC
On the (Im)Possibility of Key Dependent Encryption
Iftach Haitner
Thomas Holenstein
2009
TCC
Predicate Privacy in Encryption Systems
Emily Shen
Elaine Shi
Brent Waters
2009
TCC
Proofs of Retrievability via Hardness Amplification
Yevgeniy Dodis
Salil P. Vadhan
Daniel Wichs
2009
TCC
Purely Rational Secret Sharing (Extended Abstract)
Silvio Micali
Abhi Shelat
2009
TCC
Realistic Failures in Secure Multi-party Computation
Vassilis Zikas
Sarah Hauser
Ueli Maurer
2009
TCC
Secret Sharing and Non-Shannon Information Inequalities
Amos Beimel
Ilan Orlov
2009
TCC
Secure Arithmetic Computation with No Honest Majority
Yuval Ishai
Manoj Prabhakaran
Amit Sahai
2009
TCC
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
Robin Künzler
Jörn Müller-Quade
Dominik Raub
2009
TCC
Security Amplification for InteractiveCryptographic Primitives
Yevgeniy Dodis
Russell Impagliazzo
Ragesh Jaiswal
Valentine Kabanets
2009
TCC
Simple, Black-Box Constructions of Adaptively Secure Protocols
Seung Geol Choi
Dana Dachman-Soled
Tal Malkin
Hoeteck Wee
2009
TCC
Simulation-Based Concurrent Non-malleable Commitments and Decommitments
Rafail Ostrovsky
Giuseppe Persiano
Ivan Visconti
2009
TCC
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
Adi Akavia
Shafi Goldwasser
Vinod Vaikuntanathan
2009
TCC
Some Recent Progress in Lattice-Based Cryptography
★
Invited paper
Chris Peikert
2009
TCC
The Differential Privacy Frontier (Extended Abstract)
★
Invited paper
Cynthia Dwork
2009
TCC
Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings
2009
TCC
Towards a Theory of Extractable Functions
Ran Canetti
Ronny Ramzi Dakdouk
2009
TCC
Universally Composable Multiparty Computation with Partially Isolated Parties
Ivan Damgård
Jesper Buus Nielsen
Daniel Wichs
2009
TCC
Weak Verifiable Random Functions
Zvika Brakerski
Shafi Goldwasser
Guy N. Rothblum
Vinod Vaikuntanathan