What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from TCC 2015
Year
Venue
Title
2015
TCC
A Little Honesty Goes a Long Way - The Two-Tier Model for Secure Multiparty Computation
Juan A. Garay
Ran Gelles
David S. Johnson
Aggelos Kiayias
Moti Yung
2015
TCC
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
2015
TCC
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
Ran Canetti
Shafi Goldwasser
Oxana Poburinnaya
2015
TCC
Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds
Dana Dachman-Soled
Jonathan Katz
Vanishree Rao
2015
TCC
Aggregate Pseudorandom Functions and Connections to Learning
Aloni Cohen
Shafi Goldwasser
Vinod Vaikuntanathan
2015
TCC
An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting
Susumu Kiyoshima
2015
TCC
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-programmable Random Oracle
Yehuda Lindell
2015
TCC
Block Ciphers: From Practice back to Theory
★
Invited talk
John P. Steinberger
2015
TCC
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
Gilad Asharov
Amos Beimel
Nikolaos Makriyannis
Eran Omri
2015
TCC
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions - Or: How to Secretly Embed a Circuit in Your PRF
Zvika Brakerski
Vinod Vaikuntanathan
2015
TCC
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
Takahiro Matsuda
Goichiro Hanaoka
2015
TCC
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes
Sandro Coretti
Ueli Maurer
Björn Tackmann
Daniele Venturi
2015
TCC
From Weak to Strong Zero-Knowledge and Applications
Kai-Min Chung
Edward Lui
Rafael Pass
2015
TCC
Function-Private Functional Encryption in the Private-Key Setting
Zvika Brakerski
Gil Segev
2015
TCC
Functional Encryption for Randomized Functionalities
Vipul Goyal
Abhishek Jain
Venkata Koppula
Amit Sahai
2015
TCC
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
Ilan Komargodski
Gil Segev
Eylon Yogev
2015
TCC
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
Nico Döttling
Daniel Kraschewski
Jörn Müller-Quade
Tobias Nilges
2015
TCC
Graph-Induced Multilinear Maps from Lattices
Craig Gentry
Sergey Gorbunov
Shai Halevi
2015
TCC
Key-Homomorphic Constrained Pseudorandom Functions
Abhishek Banerjee
Georg Fuchsbauer
Chris Peikert
Krzysztof Pietrzak
Sophie Stevens
2015
TCC
Leakage-Resilient Non-malleable Codes
Divesh Aggarwal
Stefan Dziembowski
Tomasz Kazana
Maciej Obremski
2015
TCC
Locally Decodable and Updatable Non-malleable Codes and Their Applications
Dana Dachman-Soled
Feng-Hao Liu
Elaine Shi
Hong-Sheng Zhou
2015
TCC
Multi-Client Verifiable Computation with Stronger Security Guarantees
S. Dov Gordon
Jonathan Katz
Feng-Hao Liu
Elaine Shi
Hong-Sheng Zhou
2015
TCC
Non-committing Encryption from Φ-hiding
Brett Hemenway
Rafail Ostrovsky
Alon Rosen
2015
TCC
Non-malleable Condensers for Arbitrary Min-entropy, and Almost Optimal Protocols for Privacy Amplification
Xin Li
2015
TCC
Obfuscating Circuits via Composite-Order Graded Encoding
Benny Applebaum
Zvika Brakerski
2015
TCC
Obfuscation of Probabilistic Circuits and Applications
Ran Canetti
Huijia Lin
Stefano Tessaro
Vinod Vaikuntanathan
2015
TCC
Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP
Omkant Pandey
Manoj Prabhakaran
Amit Sahai
2015
TCC
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Carmit Hazay
2015
TCC
On Basing Size-Verifiable One-Way Functions on NP-Hardness
Andrej Bogdanov
Chris Brzuska
2015
TCC
On Obfuscation with Random Oracles
Ran Canetti
Yael Tauman Kalai
Omer Paneth
2015
TCC
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
Chun Guo
Dongdai Lin
2015
TCC
On the Regularity of Lossy RSA - Improved Bounds and Applications to Padding-Based Encryption
Adam Smith
Ye Zhang
2015
TCC
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model
Ronald Cramer
Carles Padró
Chaoping Xing
2015
TCC
Outlier Privacy
Edward Lui
Rafael Pass
2015
TCC
Primary-Secondary-Resolver Membership Proof Systems
Moni Naor
Asaf Ziv
2015
TCC
Public Verification of Private Effort
Giulia Alberini
Tal Moran
Alon Rosen
2015
TCC
Public-Coin Differing-Inputs Obfuscation and Its Applications
Yuval Ishai
Omkant Pandey
Amit Sahai
2015
TCC
Random-Oracle Uninstantiability from Indistinguishability Obfuscation
Chris Brzuska
Pooya Farshim
Arno Mittelbach
2015
TCC
Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way
Rafail Ostrovsky
Alessandra Scafuro
Muthuramakrishnan Venkitasubramaniam
2015
TCC
Richer Efficiency/Security Trade-offs in 2PC
Vladimir Kolesnikov
Payman Mohassel
Ben Riva
Mike Rosulek
2015
TCC
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
Vipul Goyal
Huijia Lin
Omkant Pandey
Rafael Pass
Amit Sahai
2015
TCC
Secure Physical Computation Using Disposable Circuits
Ben A. Fisch
Daniel Freund
Moni Naor
2015
TCC
Separations in Circular Security for Arbitrary Length Key Cycles
Venkata Koppula
Kim Ramchen
Brent Waters
2015
TCC
Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability
Carla Ràfols
2015
TCC
Tamper Detection and Continuous Non-malleable Codes
Zahra Jafargholi
Daniel Wichs
2015
TCC
The Power of Negations in Cryptography
Siyao Guo
Tal Malkin
Igor Carboni Oliveira
Alon Rosen
2015
TCC
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions
Yu Yu
Dawu Gu
Xiangxue Li
Jian Weng
2015
TCC
Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I
2015
TCC
Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II
2015
TCC
Tight Parallel Repetition Theorems for Public-Coin Arguments Using KL-Divergence
Kai-Min Chung
Rafael Pass
2015
TCC
Tightly-Secure Authenticated Key Exchange
Christoph Bader
Dennis Hofheinz
Tibor Jager
Eike Kiltz
Yong Li
2015
TCC
Topology-Hiding Computation
Tal Moran
Ilan Orlov
Silas Richelson
2015
TCC
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
Sanjam Garg
Antigoni Polychroniadou
2015
TCC
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
2015
TCC
Wyner's Wire-Tap Channel, Forty Years Later
★
Invited talk
Leonid Reyzin
2015
TCC
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
Nir Bitansky
Omer Paneth