What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from TCC 2012
Year
Venue
Title
2012
TCC
A Dichotomy for Local Small-Bias Generators
Benny Applebaum
Andrej Bogdanov
Alon Rosen
2012
TCC
A Parallel Repetition Theorem for Leakage Resilience
Zvika Brakerski
Yael Tauman Kalai
2012
TCC
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
Benjamin Fuller
Adam O'Neill
Leonid Reyzin
2012
TCC
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
Jae Hong Seo
Jung Hee Cheon
2012
TCC
Bounded-Collusion IBE from Key Homomorphism
Shafi Goldwasser
Allison B. Lewko
David A. Wilson
2012
TCC
Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry
Dimitar Jetchev
Onur Özen
Martijn Stam
2012
TCC
Computational Extractors and Pseudorandomness
Dana Dachman-Soled
Rosario Gennaro
Hugo Krawczyk
Tal Malkin
2012
TCC
Computing on Authenticated Data
Jae Hyun Ahn
Dan Boneh
Jan Camenisch
Susan Hohenberger
Abhi Shelat
Brent Waters
2012
TCC
Confidentiality and Integrity: A Constructive Perspective
Ueli Maurer
Andreas Rüedlinger
Björn Tackmann
2012
TCC
Counterexamples to Hardness Amplification beyond Negligible
Yevgeniy Dodis
Abhishek Jain
Tal Moran
Daniel Wichs
2012
TCC
From Non-adaptive to Adaptive Pseudorandom Functions
Itay Berman
Iftach Haitner
2012
TCC
Functional Re-encryption and Collusion-Resistant Obfuscation
Nishanth Chandran
Melissa Chase
Vinod Vaikuntanathan
2012
TCC
Hardness Preserving Constructions of Pseudorandom Functions
Abhishek Jain
Krzysztof Pietrzak
Aris Tentes
2012
TCC
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
Bryan Parno
Mariana Raykova
Vinod Vaikuntanathan
2012
TCC
Identifying Cheaters without an Honest Majority
Yuval Ishai
Rafail Ostrovsky
Hakan Seyalioglu
2012
TCC
Iterative Constructions and Private Data Release
Anupam Gupta
Aaron Roth
Jonathan Ullman
2012
TCC
Leakage-Resilient Circuits without Computational Assumptions
Stefan Dziembowski
Sebastian Faust
2012
TCC
Leakage-Tolerant Interactive Protocols
Nir Bitansky
Ran Canetti
Shai Halevi
2012
TCC
Locally Decodable Codes
★
Invited talk
Sergey Yekhanin
2012
TCC
Lossy Functions Do Not Amplify Well
Krzysztof Pietrzak
Alon Rosen
Gil Segev
2012
TCC
Lower Bounds in Differential Privacy
★
Best Student Paper
Anindya De
2012
TCC
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
Benoît Libert
Moti Yung
2012
TCC
Non-Interactive Zero-Knowledge
★
Invited talk
Jens Groth
2012
TCC
On Black-Box Reductions between Predicate Encryption Schemes
Vipul Goyal
Virendra Kumar
Satyanarayana V. Lokam
Mohammad Mahmoody
2012
TCC
On Efficient Zero-Knowledge PCPs
Yuval Ishai
Mohammad Mahmoody
Amit Sahai
2012
TCC
On the Instantiability of Hash-and-Sign RSA Signatures
Yevgeniy Dodis
Iftach Haitner
Aris Tentes
2012
TCC
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction
Avradip Mandal
Jacques Patarin
Yannick Seurin
2012
TCC
On the Security of the "Free-XOR" Technique
Seung Geol Choi
Jonathan Katz
Ranjit Kumaresan
Hong-Sheng Zhou
2012
TCC
Point Obfuscation and 3-Round Zero-Knowledge
★
Best Student Paper
Nir Bitansky
Omer Paneth
2012
TCC
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
Helger Lipmaa
2012
TCC
Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources
Yevgeniy Dodis
Thomas Ristenpart
Salil P. Vadhan
2012
TCC
Resettable Statistical Zero Knowledge
Sanjam Garg
Rafail Ostrovsky
Ivan Visconti
Akshay Wadia
2012
TCC
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
Olivier Blazy
David Pointcheval
Damien Vergnaud
2012
TCC
Secure Two-Party Computation with Low Communication
Ivan Damgård
Sebastian Faust
Carmit Hazay
2012
TCC
Simultaneously Resettable Arguments of Knowledge
Chongwon Cho
Rafail Ostrovsky
Alessandra Scafuro
Ivan Visconti
2012
TCC
Subspace LWE
Krzysztof Pietrzak
2012
TCC
The Knowledge Tightness of Parallel Zero-Knowledge
Kai-Min Chung
Rafael Pass
Wei-Lung Dustin Tseng
2012
TCC
Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings
2012
TCC
Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations
Dario Fiore
Dominique Schröder