Advertisement

© 2018

Theory of Cryptography

16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I

  • Amos Beimel
  • Stefan Dziembowski
Conference proceedings TCC 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11239)

Also part of the Security and Cryptology book sub series (LNSC, volume 11239)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Memory-Hard Functions and Complexity Theory

    1. Front Matter
      Pages 1-1
    2. Thaddeus Dryja, Quanquan C. Liu, Sunoo Park
      Pages 33-66
    3. Susumu Kiyoshima
      Pages 67-97
    4. Tianren Liu
      Pages 98-119
  3. Two-Round MPC Protocols

    1. Front Matter
      Pages 121-121
    2. Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
      Pages 123-151
    3. Benny Applebaum, Zvika Brakerski, Rotem Tsabary
      Pages 152-174
    4. Fabrice Benhamouda, Huijia Lin, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
      Pages 175-205
  4. Zero Knowledge

    1. Front Matter
      Pages 207-207
    2. Nir Bitansky, Huijia Lin
      Pages 209-234
    3. Charanjit S. Jutla, Arnab Roy
      Pages 235-262
    4. Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
      Pages 263-285
    5. Dakshita Khurana, Rafail Ostrovsky, Akshayaram Srinivasan
      Pages 286-313
  5. Information-Theoretic Cryptography

Other volumes

  1. Theory of Cryptography
    16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I
  2. 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II

About these proceedings

Introduction

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.

The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Keywords

authentication ciphertexts computer crime computer science cryptography data mining data privacy electronic document identification systems encryption hardware network security privacy privacy preserving probability project management public key cryptography secure multi-party computation semantics software engineering structural design

Editors and affiliations

  • Amos Beimel
    • 1
  • Stefan Dziembowski
    • 2
  1. 1.Ben Gurion UniversityBeer ShevaIsrael
  2. 2.University of WarsawWarsawPoland

Bibliographic information

Industry Sectors
Pharma
Automotive
Biotechnology
IT & Software
Telecommunications
Law
Aerospace
Engineering
Finance, Business & Banking
Electronics