Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project
TCC 2005: Cambridge, MA, USA

Joe Kilian (Ed.):
Theory of Cryptography, Second Theory of Cryptography Conference,
TCC 2005, Cambridge, MA, USA, February 10-12, 2005,
Proceedings.
Preface, by Joe Kilian
General Chair
Shafi Goldwasser
Massachussetts Institute of Technology, USA,
& Weizmann Institute, Israel
Administrative Assistant: Joanne Talbot Hanley
Program Committee
| Boaz Barak | | IAS and Princeton, USA |
| Amos Beimel | | Ben-Gurion, Israel |
| Rosario Gennaro | | IBM, USA |
| Joe Kilian (Chair) | | Yianilos Labs, USA |
| Anna Lysyanskaya | | Brown, USA |
| Tal Malkin | | Columbia, USA |
| Rafail Ostrovsky | | UCLA, USA |
| Erez Petrank | | Technion, Israel |
| Tal Rabin | | IBM, USA |
| Leonid Reyzin | | BU, USA |
| Alon Rosen | | MIT, USA |
| Amit Sahai | | UCLA, USA |
| Louis Salvail | | Aarhus University, Denmark |
Steering Committee
Mihir Bellare (Chair) (UCSD, USA),
Ivan Damgård (AarhusUniversity, Denmark),
Oded Goldreich (Weizmann Institute, Israel),
Shafi Goldwasser (MIT, USA and Weizmann Institute, Israel),
Johan Håstad (Royal Institute of Technology, Sweden),
Russell Impagliazzo (UCSD, USA),
Ueli Maurer (ETH, Switzerland),
Silvio Micali(MIT, USA),
Moni Naor (Weizmann Institute, Israel),
Tatsuaki Okamoto (NTT, Japan)
Hardness Amplification and Error Correction
- Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson:
Optimal Error Correction Against Computationally Bounded Noise, (.ps).
1-16
BibTeX
- Ran Canetti, Shai Halevi, Michael Steiner:
Hardness Amplification of Weakly Verifiable Puzzles, (.ps).
17-33
BibTeX
- Henry Lin, Luca Trevisan, Hoeteck Wee:
On Hardness Amplification of One-Way Functions, (.ps).
34-49
BibTeX
Graphs and Groups
Simulation and Secure Computation
Security of Encryption
Steganography and Zero Knowledge
Secure Computation I
Secure Computation II
- Dan Boneh, Eu-Jin Goh, Kobbi Nissim:
Evaluating 2-DNF Formulas on Ciphertexts, (.ps).
325-341
BibTeX
- Ronald Cramer, Ivan Damgård, Yuval Ishai:
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation, (.ps).
342-362
BibTeX
- Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith, Hoeteck Wee:
Toward Privacy in Public Databases, (.ps).
363-385
BibTeX
Quantum Cryptography and Universal Composability
- Michael Ben-Or, Michal Horodecki, Debbie W. Leung, Dominic Mayers, Jonathan Oppenheim:
The Universal Composable Security of Quantum Key Distribution, (.ps).
386-406
BibTeX
- Renato Renner, Robert König:
Universally Composable Privacy Amplification Against Quantum Adversaries, (.ps).
407-425
BibTeX
- Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
A Universally Composable Secure Channel Based on the KEM-DEM Framework, (.ps).
426-444
BibTeX
Cryptographic Primitives and Security
Encryption and Signatures
Information Theoretic Cryptography