Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings / Joe Kilian (ed.)

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: Theory of Cryptography Conference Cambridge, Mass.
Other Authors: Kilian, Joe
Other title:Second Theory of Cryptography Conference.
Theory of Cryptography Conference.
TCC 2005.
Format: Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2005.
Series:Lecture notes in computer science ; 3378.
Subjects:

MARC

LEADER 00000cam a2200000ua 4500
001 b8034268
003 CoU
005 20160219061633.3
006 m o d
007 cr |||||||||||
008 050307s2005 gw a ob 101 0 eng d
010 |a 2005920136 
019 |a 58397886  |a 225245043 
020 |a 3540245731 
020 |a 9783540245735 
024 4 |a 9783540245735 
035 |a (OCoLC)spr58393058 
035 |a (OCoLC)58393058  |z (OCoLC)58397886  |z (OCoLC)225245043 
037 |a spr10.1007/b106171  |z Connect to online resource 
040 |a CUS  |b eng  |c CUS  |d C$Q  |d IQU  |d MUQ  |d OCL  |d BAKER  |d DLC  |d IQU  |d YDXCP  |d BTCTA  |d UQ1  |d DEBBG  |d GW5XE  |d OCLCA  |d OCLCF  |d OCLCO  |d OCLCQ  |d CGU  |d QE2  |d OCL  |d OCLCO  |d DEBSZ 
049 |a GWRE 
050 0 0 |a QA76.9.A25  |b T473 2005 
111 2 |a Theory of Cryptography Conference  |n (2nd :  |d 2005 :  |c Cambridge, Mass.) 
245 1 0 |a Theory of cryptography :  |b Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings /  |c Joe Kilian (ed.) 
246 3 0 |a Second Theory of Cryptography Conference. 
246 3 0 |a Theory of Cryptography Conference. 
246 3 0 |a TCC 2005. 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2005. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 3378. 
504 |a Includes bibliographical references and index. 
505 0 0 |t Optimal error correction against computationally bounded noise /  |r Silvio Micali, Chris Peikert, Madhu Sudan and David A. Wilson --  |t Hardness amplification of weakly verifiable puzzles /  |r Ran Canetti, Shai Halevi and Michael Steiner --  |t On hardness amplification of one-way functions /  |r Henry Lin, Luca Trevisan and Hoeteck Wee --  |t Cryptography in subgroups of Z[subscript n] /  |r Jens Groth --  |t Efficiently constructible huge graphs that preserve first order properties of random graphs /  |r Moni Naor, Asaf Nussboim and Eran Tromer --  |t Comparing two notions of simulatability /  |r Dennis Hofheinz and Dominique Unruh --  |t Relaxing environmental security : monitored functionalities and client-server computation /  |r Manoj Prabhakaran and Amit Sahai --  |t Handling expected polynomial-time strategies in simulation-based security proofs /  |r Jonathan Katz and Yehuda Lindell --  |t Adaptively secure non-interactive public-key encryption /  |r Ran Canetti, Shai Halevi and Jonathan Katz --  |t Adaptive security of symbolic encryption /  |r Daniele Micciancio and Saurabh Panjwani --  |t Chosen-ciphertext security of multiple encryption /  |r Yevgeniy Dodis and Jonathan Katz --  |t Public-key steganography with active attacks /  |r Michael Backes and Christian Cachin --  |t Upper and lower bounds on black-box steganography /  |r Nenad Dedic, Gene Itkis, Leonid Reyzin and Scott Russell --  |t Fair-zero knowledge /  |r Matt Lepinski, Silvio Micali and Abhi Shelat --  |t How to securely outsource cryptographic computations /  |r Susan Hohenberger and Anna Lysyanskaya --  |t Secure computation of the mean and related statistics /  |r Eike Kiltz, Gregor Leander and John Malone-Lee --  |t Keyword search and oblivious pseudorandom functions /  |r Michael J. Freedman, Yuval Ishai, Benny Pinkas and Omer Reingold --  |t Evaluating 2-DNF formulas on ciphertexts /  |r Dan Boneh, Eu-Jin Goh and Kobbi Nissim --  |t Share conversion, pseudorandom secret-sharing and applications to secure computing /  |r Ronald Cramer, Ivan Damgard and Yuval Ishai --  |t Toward privacy in public databases /  |r Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith and Hoeteck Wee --The  |t universal composable security of quantum key distribution /  |r Michael Ben-Or, Michal Horodecki, Debbie W. Leung, Dominic Mayers and Jonathan Oppenheim --  |t Universally composable privacy amplification against quantum adversaries /  |r Renato Renner and Robert Konig --An  |t universally composable secure channel based on the KEM-DEM framework /  |r Waka Nagao, Yoshifumi Manabe and Tatsuaki Okamoto --  |t Sufficient conditions for collision-resistant hashing /  |r Yuval Ishai, Eyal Kushilevitz and Rafail Ostrovsky --The  |t relationship between password-authenticated key exchange and other cryptographic primitives /  |r Minh-Huyen Nguyen --  |t On the relationships between notions of simulation-based security /  |r Anupam Datta, Ralf Kusters, John C. Mitchell and Ajith Ramanathan --A  |t new Cramer-Shoup like methodology for group based provably secure encryption schemes /  |r Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt and Jorge L. Villar --  |t Further simplifications in proactive RSA signatures /  |r Stanislaw Jarecki and Nitesh Saxena --  |t Proof of plaintext knowledge for the Ajtai-Dwork cryptosystem /  |r Shafi Goldwasser and Dmitriy Kharchenko --  |t Entropic security and the encryption of high-entropy messages /  |r Yevgeniy Dodis and Adam Smith --  |t Error correction in the bounded storage model /  |r Yan Zong Ding --  |t Characterizing ideal weighted threshold secret sharing /  |r Amos Beimel, Tamir Tassa and Enav Weinreb. 
650 0 |a Computer security  |v Congresses. 
650 0 |a Cryptography  |v Congresses. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
700 1 |a Kilian, Joe. 
830 0 |a Lecture notes in computer science ;  |v 3378. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/b106171  |z Full Text (via Springer) 
907 |a .b80342681  |b 08-12-21  |c 06-22-15 
998 |a web  |b 02-20-16  |c f  |d b   |e -  |f eng  |g gw   |h 0  |i 4 
907 |a .b80342681  |b 02-01-17  |c 06-22-15 
956 |a Springer e-books 
956 |b Springer English/International eBooks 2005 - Full Set 
948 |a ress 
999 f f |i c21c14f4-064e-5882-b169-23ce06a06e9d  |s 4b5b61f9-ab64-552a-972b-a5bed7db9fc5 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 T473 2005  |h Library of Congress classification  |i Ebooks, Prospector  |n 1