Advertisement

Theory of Cryptography

4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings

  • Editors
  • Salil P. Vadhan

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4392)

Table of contents

  1. Front Matter
  2. Encryption I

  3. Universally Composable Security

    1. Jörn Müller-Quade, Dominique Unruh
      Pages 41-60
    2. Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish
      Pages 61-85
  4. Arguments and Zero Knowledge

    1. Krzysztof Pietrzak, Douglas Wikström
      Pages 86-102
    2. Masayuki Abe, Serge Fehr
      Pages 118-136
  5. Notions of Security

  6. Obfuscation

    1. Shafi Goldwasser, Guy N. Rothblum
      Pages 194-213
    2. Dennis Hofheinz, John Malone-Lee, Martijn Stam
      Pages 214-232
    3. Susan Hohenberger, Guy N. Rothblum, abhi shelat, Vinod Vaikuntanathan
      Pages 233-252
  7. Secret Sharing and Multiparty Computation

    1. Amos Beimel, Matthew Franklin
      Pages 253-272
    2. Jaume Martí-Farré, Carles Padró
      Pages 273-290
    3. Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew Franklin
      Pages 291-310
    4. Matthias Fitzi, Matthew Franklin, Juan Garay, S. Harsha Vardhan
      Pages 311-322
  8. Signatures and Watermarking

    1. Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda Lindell
      Pages 323-341
    2. Douglas Wikström
      Pages 342-361
    3. Nicholas Hopper, David Molnar, David Wagner
      Pages 362-382
  9. Private Approximation and Black-Box Reductions

    1. Amos Beimel, Renen Hallak, Kobbi Nissim
      Pages 383-403
    2. Remo Meier, Bartosz Przydatek, Jürg Wullschleger
      Pages 404-418
    3. Yael Gertner, Tal Malkin, Steven Myers
      Pages 434-455
  10. Key Establishment

    1. Matthias Christandl, Artur Ekert, Michał Horodecki, Paweł Horodecki, Jonathan Oppenheim, Renato Renner
      Pages 456-478
    2. David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard Lipton, Shabsi Walfish
      Pages 479-498
    3. Michel Abdalla, Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt
      Pages 499-514
  11. Encryption II

    1. Melissa Chase
      Pages 515-534
    2. Dan Boneh, Brent Waters
      Pages 535-554
    3. Ben Adida, Douglas Wikström
      Pages 555-574
    4. Yuval Ishai, Anat Paskin
      Pages 575-594
  12. Back Matter

About these proceedings

Keywords

DES Zero Knowledge authentication cryprographic protocols cryptanalysis cryptographic paradigms cryptographic primitives cryptography cryptology digital signature schemes encryption interactive hashing lower bounds multi-party computation privacy

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-70936-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-70935-0
  • Online ISBN 978-3-540-70936-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site