Advertisement

Theory of Cryptography

Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings

  • Shai Halevi
  • Tal Rabin
Conference proceedings TCC 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3876)

Table of contents

  1. Front Matter
  2. Zero-Knowledge

    1. Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil Vadhan
      Pages 1-20
    2. Ivan Damgård, Nelly Fazio, Antonio Nicolosi
      Pages 41-59
  3. Primitives

    1. Adam Bender, Jonathan Katz, Ruggero Morselli
      Pages 60-79
    2. Vladimir Kolesnikov, Charles Rackoff
      Pages 100-119
    3. Dario Catalano, Yevgeniy Dodis, Ivan Visconti
      Pages 120-144
  4. Assumptions and Models

  5. The Bounded-Retrieval Model

    1. Stefan Dziembowski
      Pages 207-224
    2. Giovanni Di Crescenzo, Richard Lipton, Shabsi Walfish
      Pages 225-244
  6. Privacy

    1. Piotr Indyk, David Woodruff
      Pages 245-264
    2. Cynthia Dwork, Frank McSherry, Kobbi Nissim, Adam Smith
      Pages 265-284
  7. Secret Sharing and Multi-party Computation (I)

    1. Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft
      Pages 285-304
    2. Zuzana Beerliová-Trubíniová, Martin Hirt
      Pages 305-328
    3. Matthias Fitzi, Juan Garay, Shyamnath Gollakota, C. Pandu Rangan, Kannan Srinathan
      Pages 329-342
  8. Universally-Composible Security

    1. Tal Malkin, Ryan Moriarty, Nikolai Yakovenko
      Pages 343-359
    2. Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
      Pages 360-379
    3. Juan Garay, Philip MacKenzie, Manoj Prabhakaran, Ke Yang
      Pages 404-428
  9. One-Way Functions and Friends

  10. Secret Sharing and Multi-party Computation (II)

    1. Amos Beimel, Noam Livne
      Pages 482-501
    2. Chiu-Yuen Koo
      Pages 502-521
    3. Kobbi Nissim, Enav Weinreb
      Pages 522-541
    4. Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung
      Pages 542-560
  11. Pseudo-Random Functions and Encryption

    1. Charanjit S. Jutla
      Pages 561-580
    2. Yevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek
      Pages 601-616
    3. Shai Halevi, Tal Rabin
      Pages E1-E1
  12. Back Matter

About these proceedings

Keywords

authentication cryptanalysis cryptographic paradigms cryptographic primitives cryptographic protocols cryptography cryptology digital signature schemes encryption multi-party computation oblivious transfer password protocols privacy pseudo-ra

Editors and affiliations

  • Shai Halevi
    • 1
  • Tal Rabin
    • 2
  1. 1.IBM ResearchHawthorneUSA
  2. 2.IBM T.J.Watson Research CenterHawthorneUSA

Bibliographic information

Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering