IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of TCC 2005

Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings , Springer
Optimal Error Correction Against Computationally Bounded Noise., Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson, pp. 1-16
 PDF  postscript BibTeX
Hardness Amplification of Weakly Verifiable Puzzles., Ran Canetti, Shai Halevi, Michael Steiner, pp. 17-33
 PDF  postscript BibTeX
On Hardness Amplification of One-Way Functions., Henry Lin, Luca Trevisan, Hoeteck Wee, pp. 34-49
 PDF  postscript BibTeX
Cryptography in Subgroups of Zn., Jens Groth, pp. 50-65
 PDF  postscript BibTeX
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs., Moni Naor, Asaf Nussboim, Eran Tromer, pp. 66-85
 PDF  postscript BibTeX
Comparing Two Notions of Simulatability., Dennis Hofheinz, Dominique Unruh, pp. 86-103
 PDF  postscript BibTeX
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation., Manoj Prabhakaran, Amit Sahai, pp. 104-127
 PDF  postscript BibTeX
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs., Jonathan Katz, Yehuda Lindell, pp. 128-149
 PDF  postscript BibTeX
Adaptively-Secure, Non-interactive Public-Key Encryption., Ran Canetti, Shai Halevi, Jonathan Katz, pp. 150-168
 PDF  postscript BibTeX
Adaptive Security of Symbolic Encryption., Daniele Micciancio, Saurabh Panjwani, pp. 169-187
 PDF  postscript BibTeX
Chosen-Ciphertext Security of Multiple Encryption., Yevgeniy Dodis, Jonathan Katz, pp. 188-209
 PDF  postscript BibTeX
Public-Key Steganography with Active Attacks., Michael Backes, Christian Cachin, pp. 210-226
 PDF  postscript BibTeX
Upper and Lower Bounds on Black-Box Steganography., Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell, pp. 227-244
 PDF  postscript BibTeX
Fair-Zero Knowledge., Matt Lepinski, Silvio Micali, Abhi Shelat, pp. 245-263
 PDF  postscript BibTeX
How to Securely Outsource Cryptographic Computations., Susan Hohenberger, Anna Lysyanskaya, pp. 264-282
 PDF  postscript BibTeX
Secure Computation of the Mean and Related Statistics., Eike Kiltz, Gregor Leander, John Malone-Lee, pp. 283-302
 PDF  postscript BibTeX
Keyword Search and Oblivious Pseudorandom Functions., Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold, pp. 303-324
 PDF  postscript BibTeX
Evaluating 2-DNF Formulas on Ciphertexts., Dan Boneh, Eu-Jin Goh, Kobbi Nissim, pp. 325-341
 PDF  postscript BibTeX
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation., Ronald Cramer, Ivan Damgård, Yuval Ishai, pp. 342-362
 PDF  postscript BibTeX
Toward Privacy in Public Databases., Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith, Hoeteck Wee, pp. 363-385
 PDF  postscript BibTeX
The Universal Composable Security of Quantum Key Distribution., Michael Ben-Or, Michal Horodecki, Debbie W. Leung, Dominic Mayers, Jonathan Oppenheim, pp. 386-406
 PDF  postscript BibTeX
Universally Composable Privacy Amplification Against Quantum Adversaries., Renato Renner, Robert König, pp. 407-425
 PDF  postscript BibTeX
A Universally Composable Secure Channel Based on the KEM-DEM Framework., Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto, pp. 426-444
 PDF  postscript BibTeX
Sufficient Conditions for Collision-Resistant Hashing., Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, pp. 445-456
 PDF  postscript BibTeX
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives., Minh-Huyen Nguyen, pp. 457-475
 PDF  postscript BibTeX
On the Relationships Between Notions of Simulation-Based Security., Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan, pp. 476-494
 PDF  postscript BibTeX
A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes., Maria Isabel Gonzalez Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar, pp. 495-509
 PDF  postscript BibTeX
Further Simplifications in Proactive RSA Signatures., Stanislaw Jarecki, Nitesh Saxena, pp. 510-528
 PDF  postscript BibTeX
Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem., Shafi Goldwasser, Dmitriy Kharchenko, pp. 529-555
 PDF  postscript BibTeX
Entropic Security and the Encryption of High Entropy Messages., Yevgeniy Dodis, Adam Smith, pp. 556-577
 PDF  postscript BibTeX
Error Correction in the Bounded Storage Model., Yan Zong Ding, pp. 578-599
 PDF  postscript BibTeX
Characterizing Ideal Weighted Threshold Secret Sharing., Amos Beimel, Tamir Tassa, Enav Weinreb, pp. 600-619
 PDF  postscript BibTeX

[ IACR home page ] © IACR