


default search action
1. TCC 2004: Cambridge, MA, USA
- Moni Naor:

Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings. Lecture Notes in Computer Science 2951, Springer 2004, ISBN 3-540-21000-8 - Omer Reingold, Luca Trevisan, Salil P. Vadhan:

Notions of Reducibility between Cryptographic Primitives. 1-20 - Ueli M. Maurer, Renato Renner, Clemens Holenstein:

Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. 21-39 - Ran Canetti, Oded Goldreich, Shai Halevi:

On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes. 40-57 - Dennis Hofheinz, Jörn Müller-Quade:

Universally Composable Commitments Using Random Oracles. 58-76 - Shafi Goldwasser, Erez Waisbard:

Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes. 77-100 - Cynthia Dwork, Ronen Shaltiel, Adam D. Smith, Luca Trevisan:

List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument. 101-120 - Boaz Barak, Rafael Pass

:
On the Possibility of One-Message Weak Zero-Knowledge. 121-132 - Daniele Micciancio, Bogdan Warinschi:

Soundness of Formal Encryption in the Presence of Active Adversaries. 133-151 - Jens Groth

:
Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems. 152-170 - Philip D. MacKenzie, Michael K. Reiter, Ke Yang:

Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract). 171-190 - Alon Rosen:

A Note on Constant-Round Zero-Knowledge Proofs for NP. 191-202 - Yehuda Lindell:

Lower Bounds for Concurrent Self Composition. 203-222 - Ronald Cramer, Ivan Damgård:

Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation. 223-237 - Amos Beimel, Tal Malkin:

A Quantitative Approach to Reductions in Secure Computation. 238-257 - Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin:

Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. 258-277 - Silvio Micali, Leonid Reyzin:

Physically Observable Cryptography (Extended Abstract). 278-296 - Juan A. Garay:

Efficient and Universally Composable Committed Oblivious Transfer and Applications. 297-316 - Douglas Wikström:

A Universally Composable Mix-Net. 317-335 - Michael Backes, Birgit Pfitzmann, Michael Waidner

:
A General Composition Theorem for Secure Reactive Systems. 336-354 - Ivan Damgård, Serge Fehr, Kirill Morozov, Louis Salvail:

Unfair Noisy Channels and Oblivious Transfer. 355-373 - Claude Crépeau, Paul Dumais, Dominic Mayers, Louis Salvail:

Computational Collapse of Quantum State with Application to Oblivious Transfer. 374-393 - Iftach Haitner:

Implementing Oblivious Transfer Using Collection of Dense Trapdoor Permutations. 394-409 - Ueli M. Maurer, Krzysztof Pietrzak:

Composition of Random Systems: When Two Weak Make One Strong. 410-427 - Minh-Huyen Nguyen, Salil P. Vadhan:

Simpler Session-Key Generation from Short Random Passwords. 428-445 - Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel:

Constant-Round Oblivious Transfer in the Bounded Storage Model. 446-472 - Tamir Tassa:

Hierarchical Threshold Secret Sharing. 473-490 - Mark Johnson, David A. Wagner, Kannan Ramchandran:

On Compressing Encrypted Data without the Encryption Key. 491-504 - Ronald L. Rivest:

On the Notion of Pseudo-Free Groups. 505-521

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














