Conferences in DBLP
Silvio Micali , Chris Peikert , Madhu Sudan , David A. Wilson Optimal Error Correction Against Computationally Bounded Noise. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:1-16 [Conf ] Ran Canetti , Shai Halevi , Michael Steiner Hardness Amplification of Weakly Verifiable Puzzles. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:17-33 [Conf ] Henry Lin , Luca Trevisan , Hoeteck Wee On Hardness Amplification of One-Way Functions. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:34-49 [Conf ] Jens Groth Cryptography in Subgroups of Zn . [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:50-65 [Conf ] Moni Naor , Asaf Nussboim , Eran Tromer Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:66-85 [Conf ] Dennis Hofheinz , Dominique Unruh Comparing Two Notions of Simulatability. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:86-103 [Conf ] Manoj Prabhakaran , Amit Sahai Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:104-127 [Conf ] Jonathan Katz , Yehuda Lindell Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:128-149 [Conf ] Ran Canetti , Shai Halevi , Jonathan Katz Adaptively-Secure, Non-interactive Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:150-168 [Conf ] Daniele Micciancio , Saurabh Panjwani Adaptive Security of Symbolic Encryption. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:169-187 [Conf ] Yevgeniy Dodis , Jonathan Katz Chosen-Ciphertext Security of Multiple Encryption. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:188-209 [Conf ] Michael Backes , Christian Cachin Public-Key Steganography with Active Attacks. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:210-226 [Conf ] Nenad Dedic , Gene Itkis , Leonid Reyzin , Scott Russell Upper and Lower Bounds on Black-Box Steganography. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:227-244 [Conf ] Matt Lepinski , Silvio Micali , Abhi Shelat Fair-Zero Knowledge. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:245-263 [Conf ] Susan Hohenberger , Anna Lysyanskaya How to Securely Outsource Cryptographic Computations. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:264-282 [Conf ] Eike Kiltz , Gregor Leander , John Malone-Lee Secure Computation of the Mean and Related Statistics. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:283-302 [Conf ] Michael J. Freedman , Yuval Ishai , Benny Pinkas , Omer Reingold Keyword Search and Oblivious Pseudorandom Functions. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:303-324 [Conf ] Dan Boneh , Eu-Jin Goh , Kobbi Nissim Evaluating 2-DNF Formulas on Ciphertexts. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:325-341 [Conf ] Ronald Cramer , Ivan Damgård , Yuval Ishai Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:342-362 [Conf ] Shuchi Chawla , Cynthia Dwork , Frank McSherry , Adam Smith , Hoeteck Wee Toward Privacy in Public Databases. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:363-385 [Conf ] Michael Ben-Or , Michal Horodecki , Debbie W. Leung , Dominic Mayers , Jonathan Oppenheim The Universal Composable Security of Quantum Key Distribution. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:386-406 [Conf ] Renato Renner , Robert König Universally Composable Privacy Amplification Against Quantum Adversaries. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:407-425 [Conf ] Waka Nagao , Yoshifumi Manabe , Tatsuaki Okamoto A Universally Composable Secure Channel Based on the KEM-DEM Framework. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:426-444 [Conf ] Yuval Ishai , Eyal Kushilevitz , Rafail Ostrovsky Sufficient Conditions for Collision-Resistant Hashing. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:445-456 [Conf ] Minh-Huyen Nguyen The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:457-475 [Conf ] Anupam Datta , Ralf Küsters , John C. Mitchell , Ajith Ramanathan On the Relationships Between Notions of Simulation-Based Security. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:476-494 [Conf ] Maria Isabel Gonzalez Vasco , Consuelo Martínez , Rainer Steinwandt , Jorge Luis Villar A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:495-509 [Conf ] Stanislaw Jarecki , Nitesh Saxena Further Simplifications in Proactive RSA Signatures. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:510-528 [Conf ] Shafi Goldwasser , Dmitriy Kharchenko Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:529-555 [Conf ] Yevgeniy Dodis , Adam Smith Entropic Security and the Encryption of High Entropy Messages. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:556-577 [Conf ] Yan Zong Ding Error Correction in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:578-599 [Conf ] Amos Beimel , Tamir Tassa , Enav Weinreb Characterizing Ideal Weighted Threshold Secret Sharing. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:600-619 [Conf ]