Advertisement

Theory of Cryptography

Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

  • Editors
  • Ran Canetti

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4948)

Table of contents

  1. Front Matter
  2. Technical Session 1

  3. Technical Session 2

    1. Vadim Lyubashevsky, Daniele Micciancio
      Pages 37-54
    2. Eli Biham, Yaron J. Goren, Yuval Ishai
      Pages 55-72
  4. Technical Session 3

  5. Technical Session 4

  6. Technical Session 5

    1. Amos Beimel, Noam Livne, Carles Padró
      Pages 194-212
    2. Zuzana Beerliová-Trubíniová, Martin Hirt
      Pages 213-230
    3. Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas
      Pages 231-250
  7. Invited Talk

  8. Technical Session 6

    1. Sergei Izmalkov, Matt Lepinski, Silvio Micali
      Pages 273-301
    2. Ittai Abraham, Danny Dolev, Joseph Y. Halpern
      Pages 302-319
  9. Technical Session 7

    1. Aggelos Kiayias, Hong-Sheng Zhou
      Pages 340-355
    2. Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
      Pages 356-374
  10. Technical Session 8

    1. Marc Fischlin, Anja Lehmann
      Pages 375-392
    2. Danny Harnik, Yuval Ishai, Eyal Kushilevitz, Jesper Buus Nielsen
      Pages 393-411
    3. Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
      Pages 427-444
  11. Technical Session 9

  12. Technical Session 10

    1. Shien Jin Ong, Salil Vadhan
      Pages 482-500
    2. André Chailloux, Dragos Florin Ciocan, Iordanis Kerenidis, Salil Vadhan
      Pages 501-534
  13. Technical Session 11

    1. Rafael Pass, Muthuramakrishnan Venkitasubramaniam
      Pages 553-570
  14. Technical Session 12

    1. Huijia Lin, Rafael Pass, Muthuramakrishnan Venkitasubramaniam
      Pages 571-588
  15. Technical Session 13

    1. Nenad Dedić, Danny Harnik, Leonid Reyzin
      Pages 607-625
    2. Shai Halevi, Tal Rabin
      Pages 626-643
  16. Back Matter

About these proceedings

Keywords

DES Information Private Information Retrieval Signatur communication complexity cryptographic protocols cryptography cryptology digital signature schemes game theory lower bounds multi-party computation multicast encryption security

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-78524-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-78523-1
  • Online ISBN 978-3-540-78524-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site