Theory of Cryptography Conference

Results: 89



#Item
11Theory of Cryptography Conference / Transferware / Old Sturbridge Village / Willow pattern

WinterRead-Only)

Add to Reading List

Source URL: www.transcollectorsclub.org

Language: English - Date: 2008-02-25 13:28:25
12Spode / New England / Geography of Massachusetts / Geography of the United States / Massachusetts / Transferware / Theory of Cryptography Conference / Boston

PDF Document

Add to Reading List

Source URL: www.transcollectorsclub.org

Language: English - Date: 2014-01-14 15:32:51
13Theory of Cryptography Conference / Conventions / BlogHer / Blogs

We offer a number of different ways to map out your CREATIVE CONNECTION experience. Buy a Weekender pass and take in a little bit of everything! Weekender: $Minus a 15% full weekend savings = $Day Tripper:

Add to Reading List

Source URL: www.thecreativeconnectionevent.com

Language: English - Date: 2011-09-08 14:08:00
14RSA / Chosen-plaintext attack / Chosen-ciphertext attack / Advantage / ElGamal encryption / Ciphertext / Semantic security / Malleability / Cryptography / Ciphertext indistinguishability / Authenticated encryption

An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-09 19:14:56
15Proof theory / Zero-knowledge proof / Interactive proof system / Commitment scheme / IP / Soundness / Probabilistically checkable proof / Random oracle / Symbol / Cryptography / Theoretical computer science / Cryptographic protocols

— A merged version of this work and the work of [BGW12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — On the (In)security of the Fiat-Shamir Paradigm, Revisited Dana Dachman-Soled M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 13:39:52
16Computability theory / Oracle machine

A preliminary version of this paper appeared in Theory of Cryptography Conference, TCC ’05, Lecture Notes in Computer Science Vol. ???, Joe Kilian ed, Springer Verlag, 2005. This is the full version. Secure Computation

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-15 13:27:27
17Search algorithms / Computational complexity theory / Random oracle / Interactive proof system / Hash function / Zero-knowledge proof / Universal hashing / Collision resistance / Hash list / Cryptography / Cryptographic hash functions / Hashing

— A merged version of this work and the work of [DJKL12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — Why “Fiat-Shamir for Proofs” Lacks a Proof Nir Bitansky∗ Tel Aviv Univer

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-19 16:42:35
18Computational complexity theory / Coding theory / Randomness / Randomness extractor / Extractor / Advantage / Ciphertext indistinguishability / Leftover hash lemma / Adversary model / Cryptography / Theoretical computer science / Applied mathematics

An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-15 15:22:16
19IP / Direct Anonymous Attestation / Non-interactive zero-knowledge proof / Zero-knowledge proof / Information / Soundness / NP / Mathematics / Cryptographic protocols / Applied mathematics / Proof of knowledge

This Extended Abstract appears in the Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’[removed] – 28 March 2014, Buenos Aires, Argentina) Hugo Krawczyk Ed., Spri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 06:04:31
20Number theory / Factorial / Mathematics / Combinatorics / Integer sequences

This is the Full Version of the Extended Abstract that appears in the Proceedings of the 13th International Conference on Applied Cryptography and Network Security (ACNS ’15) (2–5 June 2015, New York, USA) Tal Malkin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 10:46:41
UPDATE