Conferences in DBLP
Carl Bosley , Yevgeniy Dodis Does Privacy Require True Randomness? [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:1-20 [Conf ] Saurabh Panjwani Tackling Adaptive Corruptions in Multicast Encryption Protocols. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:21-40 [Conf ] Jörn Müller-Quade , Dominique Unruh Long-Term Security and Universal Composability. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:41-60 [Conf ] Ran Canetti , Yevgeniy Dodis , Rafael Pass , Shabsi Walfish Universally Composable Security with Global Setup. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:61-85 [Conf ] Krzysztof Pietrzak , Douglas Wikström Parallel Repetition of Computationally Sound Protocols Revisited. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:86-102 [Conf ] Hoeteck Wee Lower Bounds for Non-interactive Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:103-117 [Conf ] Masayuki Abe , Serge Fehr Perfect NIZK with Adaptive Soundness. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:118-136 [Conf ] Yonatan Aumann , Yehuda Lindell Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:137-156 [Conf ] Michael Backes , Jörn Müller-Quade , Dominique Unruh On the Necessity of Rewinding in Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:157-173 [Conf ] Oded Goldreich On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:174-193 [Conf ] Shafi Goldwasser , Guy N. Rothblum On Best-Possible Obfuscation. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:194-213 [Conf ] Dennis Hofheinz , John Malone-Lee , Martijn Stam Obfuscation for Cryptographic Purposes. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:214-232 [Conf ] Susan Hohenberger , Guy N. Rothblum , Abhi Shelat , Vinod Vaikuntanathan Securely Obfuscating Re-encryption. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:233-252 [Conf ] Amos Beimel , Matthew K. Franklin Weakly-Private Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:253-272 [Conf ] Jaume Martí-Farré , Carles Padró On Secret Sharing Schemes, Matroids and Polymatroids. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:273-290 [Conf ] Eike Kiltz , Payman Mohassel , Enav Weinreb , Matthew K. Franklin Secure Linear Algebra Using Linearly Recurrent Sequences. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:291-310 [Conf ] Matthias Fitzi , Matthew K. Franklin , Juan A. Garay , S. Harsha Vardhan Towards Optimal and Efficient Perfectly Secure Message Transmission. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:311-322 [Conf ] Carmit Hazay , Jonathan Katz , Chiu-Yuen Koo , Yehuda Lindell Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:323-341 [Conf ] Douglas Wikström Designated Confirmer Signatures Revisited. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:342-361 [Conf ] Nicholas Hopper , David Molnar , David Wagner From Weak to Strong Watermarking. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:362-382 [Conf ] Amos Beimel , Renen Hallak , Kobbi Nissim Private Approximation of Clustering and Vertex Cover. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:383-403 [Conf ] Remo Meier , Bartosz Przydatek , Jürg Wullschleger Robuster Combiners for Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:404-418 [Conf ] Hoeteck Wee One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:419-433 [Conf ] Yael Gertner , Tal Malkin , Steven Myers Towards a Separation of Semantic and CCA Security for Public Key Encryption. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:434-455 [Conf ] Matthias Christandl , Artur Ekert , Michal Horodecki , Pawel Horodecki , Jonathan Oppenheim , Renato Renner Unifying Classical and Quantum Key Distillation. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:456-478 [Conf ] David Cash , Yan Zong Ding , Yevgeniy Dodis , Wenke Lee , Richard J. Lipton , Shabsi Walfish Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:479-498 [Conf ] Michel Abdalla , Jens-Matthias Bohli , Maria Isabel Gonzalez Vasco , Rainer Steinwandt (Password) Authenticated Key Establishment: From 2-Party to Group. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:499-514 [Conf ] Melissa Chase Multi-authority Attribute Based Encryption. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:515-534 [Conf ] Dan Boneh , Brent Waters Conjunctive, Subset, and Range Queries on Encrypted Data. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:535-554 [Conf ] Ben Adida , Douglas Wikström How to Shuffle in Public. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:555-574 [Conf ] Yuval Ishai , Anat Paskin Evaluating Branching Programs on Encrypted Data. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:575-594 [Conf ]