Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings / Joe Kilian (ed.)
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | |
Other title: | Second Theory of Cryptography Conference. Theory of Cryptography Conference. TCC 2005. |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2005.
|
Series: | Lecture notes in computer science ;
3378. |
Subjects: |
MARC
LEADER | 00000cam a2200000ua 4500 | ||
---|---|---|---|
001 | b8034268 | ||
003 | CoU | ||
005 | 20160219061633.3 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 050307s2005 gw a ob 101 0 eng d | ||
010 | |a 2005920136 | ||
019 | |a 58397886 |a 225245043 | ||
020 | |a 3540245731 | ||
020 | |a 9783540245735 | ||
024 | 4 | |a 9783540245735 | |
035 | |a (OCoLC)spr58393058 | ||
035 | |a (OCoLC)58393058 |z (OCoLC)58397886 |z (OCoLC)225245043 | ||
037 | |a spr10.1007/b106171 |z Connect to online resource | ||
040 | |a CUS |b eng |c CUS |d C$Q |d IQU |d MUQ |d OCL |d BAKER |d DLC |d IQU |d YDXCP |d BTCTA |d UQ1 |d DEBBG |d GW5XE |d OCLCA |d OCLCF |d OCLCO |d OCLCQ |d CGU |d QE2 |d OCL |d OCLCO |d DEBSZ | ||
049 | |a GWRE | ||
050 | 0 | 0 | |a QA76.9.A25 |b T473 2005 |
111 | 2 | |a Theory of Cryptography Conference |n (2nd : |d 2005 : |c Cambridge, Mass.) | |
245 | 1 | 0 | |a Theory of cryptography : |b Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings / |c Joe Kilian (ed.) |
246 | 3 | 0 | |a Second Theory of Cryptography Conference. |
246 | 3 | 0 | |a Theory of Cryptography Conference. |
246 | 3 | 0 | |a TCC 2005. |
260 | |a Berlin ; |a New York : |b Springer, |c ©2005. | ||
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 3378. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |t Optimal error correction against computationally bounded noise / |r Silvio Micali, Chris Peikert, Madhu Sudan and David A. Wilson -- |t Hardness amplification of weakly verifiable puzzles / |r Ran Canetti, Shai Halevi and Michael Steiner -- |t On hardness amplification of one-way functions / |r Henry Lin, Luca Trevisan and Hoeteck Wee -- |t Cryptography in subgroups of Z[subscript n] / |r Jens Groth -- |t Efficiently constructible huge graphs that preserve first order properties of random graphs / |r Moni Naor, Asaf Nussboim and Eran Tromer -- |t Comparing two notions of simulatability / |r Dennis Hofheinz and Dominique Unruh -- |t Relaxing environmental security : monitored functionalities and client-server computation / |r Manoj Prabhakaran and Amit Sahai -- |t Handling expected polynomial-time strategies in simulation-based security proofs / |r Jonathan Katz and Yehuda Lindell -- |t Adaptively secure non-interactive public-key encryption / |r Ran Canetti, Shai Halevi and Jonathan Katz -- |t Adaptive security of symbolic encryption / |r Daniele Micciancio and Saurabh Panjwani -- |t Chosen-ciphertext security of multiple encryption / |r Yevgeniy Dodis and Jonathan Katz -- |t Public-key steganography with active attacks / |r Michael Backes and Christian Cachin -- |t Upper and lower bounds on black-box steganography / |r Nenad Dedic, Gene Itkis, Leonid Reyzin and Scott Russell -- |t Fair-zero knowledge / |r Matt Lepinski, Silvio Micali and Abhi Shelat -- |t How to securely outsource cryptographic computations / |r Susan Hohenberger and Anna Lysyanskaya -- |t Secure computation of the mean and related statistics / |r Eike Kiltz, Gregor Leander and John Malone-Lee -- |t Keyword search and oblivious pseudorandom functions / |r Michael J. Freedman, Yuval Ishai, Benny Pinkas and Omer Reingold -- |t Evaluating 2-DNF formulas on ciphertexts / |r Dan Boneh, Eu-Jin Goh and Kobbi Nissim -- |t Share conversion, pseudorandom secret-sharing and applications to secure computing / |r Ronald Cramer, Ivan Damgard and Yuval Ishai -- |t Toward privacy in public databases / |r Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith and Hoeteck Wee --The |t universal composable security of quantum key distribution / |r Michael Ben-Or, Michal Horodecki, Debbie W. Leung, Dominic Mayers and Jonathan Oppenheim -- |t Universally composable privacy amplification against quantum adversaries / |r Renato Renner and Robert Konig --An |t universally composable secure channel based on the KEM-DEM framework / |r Waka Nagao, Yoshifumi Manabe and Tatsuaki Okamoto -- |t Sufficient conditions for collision-resistant hashing / |r Yuval Ishai, Eyal Kushilevitz and Rafail Ostrovsky --The |t relationship between password-authenticated key exchange and other cryptographic primitives / |r Minh-Huyen Nguyen -- |t On the relationships between notions of simulation-based security / |r Anupam Datta, Ralf Kusters, John C. Mitchell and Ajith Ramanathan --A |t new Cramer-Shoup like methodology for group based provably secure encryption schemes / |r Maria Isabel Gonzalez Vasco, Consuelo Martinez, Rainer Steinwandt and Jorge L. Villar -- |t Further simplifications in proactive RSA signatures / |r Stanislaw Jarecki and Nitesh Saxena -- |t Proof of plaintext knowledge for the Ajtai-Dwork cryptosystem / |r Shafi Goldwasser and Dmitriy Kharchenko -- |t Entropic security and the encryption of high-entropy messages / |r Yevgeniy Dodis and Adam Smith -- |t Error correction in the bounded storage model / |r Yan Zong Ding -- |t Characterizing ideal weighted threshold secret sharing / |r Amos Beimel, Tamir Tassa and Enav Weinreb. |
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Cryptography |v Congresses. | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484. | |
650 | 7 | |a Cryptography. |2 fast |0 (OCoLC)fst00884552. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772. | |
700 | 1 | |a Kilian, Joe. | |
830 | 0 | |a Lecture notes in computer science ; |v 3378. | |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/b106171 |z Full Text (via Springer) |
907 | |a .b80342681 |b 08-12-21 |c 06-22-15 | ||
998 | |a web |b 02-20-16 |c f |d b |e - |f eng |g gw |h 0 |i 4 | ||
907 | |a .b80342681 |b 02-01-17 |c 06-22-15 | ||
956 | |a Springer e-books | ||
956 | |b Springer English/International eBooks 2005 - Full Set | ||
948 | |a ress | ||
999 | f | f | |i c21c14f4-064e-5882-b169-23ce06a06e9d |s 4b5b61f9-ab64-552a-972b-a5bed7db9fc5 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.9.A25 T473 2005 |h Library of Congress classification |i Ebooks, Prospector |n 1 |