What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from TCC 2013
Year
Venue
Title
2013
TCC
A Cookbook for Black-Box Separations and a Recipe for UOWHFs
Kfir Barhum
Thomas Holenstein
2013
TCC
A Counterexample to the Chain Rule for Conditional HILL Entropy, and what Deniable Encryption has to do with it
Stephan Krenn
Krzysztof Pietrzak
Akshay Wadia
2013
TCC
A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness
Gilad Asharov
Yehuda Lindell
Tal Rabin
2013
TCC
Algebraic (Trapdoor) One Way Functions and their Applications
Dario Catalano
Dario Fiore
Rosario Gennaro
Konstantinos Vamvourellis
2013
TCC
Analyzing Graphs with Node Differential Privacy
Shiva Kasiviswanathan
Kobbi Nissim
Sofya Raskhodnikova
Adam Smith
2013
TCC
Attribute-Based Functional Encryption on Lattices
Xavier Boyen
2013
TCC
Barriers to Provably-Secure Perfect NIZK and Non-interactive Non-malleable Commitments
Rafael Pass
2013
TCC
Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead
Steven Myers
Mona Sergi
abhi shelat
2013
TCC
Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities
R. Amzi Jeffs
Mike Rosulek
2013
TCC
Communication Locality in Secure Multi-Party Computation: How to Run Sublinear Algorithms in a Distributed Setting
Elette Boyle
Shafi Goldwasser
Stefano Tessaro
2013
TCC
Computational Soundness of Coinductive Symbolic Security under Active Attacks
Mohammad Hajiabadi
Bruce M. Kapron
2013
TCC
Concurrent Zero Knowledge in the Bounded Player Model
Vipul Goyal
Abhishek Jain
Rafail Ostrovsky
Silas Richelson
Ivan Visconti
2013
TCC
Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing
Ivan Damgård
Sarah Zakarias
2013
TCC
Cryptographic Hardness of Random Local Functions -- Survey
★
Invited paper
Benny Applebaum
2013
TCC
Distributed Oblivious RAM for Secure Two-Party Computation
Steve Lu
Rafail Ostrovsky
2013
TCC
Encrypted Messages from the Heights of Cryptomania
★
Invited paper
Craig Gentry
2013
TCC
ERRATA: (Nearly) round-optimal black-box constructions of commitments secure against selective opening attacks
David Xiao
2013
TCC
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
Serge Fehr
Jonathan Katz
Fang Song
Hong-Sheng Zhou
Vassilis Zikas
2013
TCC
Garbling XOR Gates "For Free" in the Standard Model
Benny Applebaum
2013
TCC
Hardness Preserving Reductions via Cuckoo Hashing
Itay Berman
Iftach Haitner
Ilan Komargodski
Moni Naor
2013
TCC
Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens
Nico Döttling
Thilo Mie
Jörn Müller-Quade
Tobias Nilges
2013
TCC
Languages with Efficient Zero-Knowledge PCPs are in SZK
Mohammad Mahmoody
David Xiao
2013
TCC
Limits on the Usefulness of Random Oracles
Iftach Haitner
Eran Omri
Hila Zarosim
2013
TCC
Multi-Client Non-Interactive Verifiable Computation
Seung Geol Choi
Jonathan Katz
Ranjit Kumaresan
Carlos Cid
2013
TCC
On the (In)security of Fischlin's Paradigm
Prabhanjan Ananth
Raghav Bhaskar
Vipul Goyal
Vanishree Rao
2013
TCC
On the Circular Security of Bit-Encryption
Ron D. Rothblum
2013
TCC
On the Feasibility of Extending Oblivious Transfer
Yehuda Lindell
Hila Zarosim
2013
TCC
On the Power of Correlated Randomness in Secure Computation
Yuval Ishai
Eyal Kushilevitz
Sigurd Meldgaard
Claudio Orlandi
Anat Paskin-Cherniavsky
2013
TCC
Overcoming Weak Expectations
Yevgeniy Dodis
Yu Yu
2013
TCC
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model
Ran Canetti
Huijia Lin
Omer Paneth
2013
TCC
Randomness-Dependent Message Security
Eleanor Birrell
Kai-Min Chung
Rafael Pass
Sidharth Telang
2013
TCC
Revisiting Lower and Upper Bounds for Selective Decommitments
Rafail Ostrovsky
Vanishree Rao
Alessandra Scafuro
Ivan Visconti
2013
TCC
Secure Computation for Big Data
★
Invited paper
Tal Malkin
2013
TCC
Signatures of Correct Computation
Charalampos Papamanthou
Elaine Shi
Roberto Tamassia
2013
TCC
Succinct Malleable NIZKs and an Application to Compact Shuffles
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Sarah Meiklejohn
2013
TCC
Succinct Non-Interactive Arguments via Linear Interactive Proofs
Nir Bitansky
Alessandro Chiesa
Yuval Ishai
Rafail Ostrovsky
Omer Paneth
2013
TCC
Testing the Lipschitz Property over Product Distributions with Applications to Data Privacy
Kashyap Dixit
Madhav Jha
Sofya Raskhodnikova
Abhradeep Thakurta
2013
TCC
Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings
2013
TCC
Universally Composable Synchronous Computation
Jonathan Katz
Ueli Maurer
Björn Tackmann
Vassilis Zikas
2013
TCC
When Homomorphism Becomes a Liability
Zvika Brakerski
2013
TCC
Why ``Fiat-Shamir for Proofs" Lacks a Proof
Nir Bitansky
Dana Dachman-Soled
Sanjam Garg
Abhishek Jain
Yael Tauman Kalai
Adriana Lopez-Alt
Daniel Wichs