What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from TCC 2005
Year
Venue
Title
2005
TCC
A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes
Maria Isabel Gonzalez Vasco
Consuelo Martínez
Rainer Steinwandt
Jorge Luis Villar
2005
TCC
A Universally Composable Secure Channel Based on the KEM-DEM Framework
Waka Nagao
Yoshifumi Manabe
Tatsuaki Okamoto
2005
TCC
Adaptive Security of Symbolic Encryption
Daniele Micciancio
Saurabh Panjwani
2005
TCC
Adaptively-Secure, Non-interactive Public-Key Encryption
Ran Canetti
Shai Halevi
Jonathan Katz
2005
TCC
Characterizing Ideal Weighted Threshold Secret Sharing
Amos Beimel
Tamir Tassa
Enav Weinreb
2005
TCC
Chosen-Ciphertext Security of Multiple Encryption
Yevgeniy Dodis
Jonathan Katz
2005
TCC
Comparing Two Notions of Simulatability
Dennis Hofheinz
Dominique Unruh
2005
TCC
Cryptography in Subgroups of Z<sub>n</sub>
Jens Groth
2005
TCC
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs
Moni Naor
Asaf Nussboim
Eran Tromer
2005
TCC
Entropic Security and the Encryption of High Entropy Messages
Yevgeniy Dodis
Adam Smith
2005
TCC
Error Correction in the Bounded Storage Model
Yan Zong Ding
2005
TCC
Evaluating 2-DNF Formulas on Ciphertexts
★
TCC Test of Time Award
Dan Boneh
Eu-Jin Goh
Kobbi Nissim
2005
TCC
Fair-Zero Knowledge
Matt Lepinski
Silvio Micali
Abhi Shelat
2005
TCC
Further Simplifications in Proactive RSA Signatures
Stanislaw Jarecki
Nitesh Saxena
2005
TCC
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
Jonathan Katz
Yehuda Lindell
2005
TCC
Hardness Amplification of Weakly Verifiable Puzzles
Ran Canetti
Shai Halevi
Michael Steiner
2005
TCC
How to Securely Outsource Cryptographic Computations
Susan Hohenberger
Anna Lysyanskaya
2005
TCC
Keyword Search and Oblivious Pseudorandom Functions
★
TCC Test-of-Time Award
Michael J. Freedman
Yuval Ishai
Benny Pinkas
Omer Reingold
2005
TCC
On Hardness Amplification of One-Way Functions
Henry Lin
Luca Trevisan
Hoeteck Wee
2005
TCC
On the Relationships Between Notions of Simulation-Based Security
Anupam Datta
Ralf Küsters
John C. Mitchell
Ajith Ramanathan
2005
TCC
Optimal Error Correction Against Computationally Bounded Noise
Silvio Micali
Chris Peikert
Madhu Sudan
David A. Wilson
2005
TCC
Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem
Shafi Goldwasser
Dmitriy Kharchenko
2005
TCC
Public-Key Steganography with Active Attacks
Michael Backes
Christian Cachin
2005
TCC
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
Manoj Prabhakaran
Amit Sahai
2005
TCC
Secure Computation of the Mean and Related Statistics
Eike Kiltz
Gregor Leander
John Malone-Lee
2005
TCC
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation
Ronald Cramer
Ivan Damgård
Yuval Ishai
2005
TCC
Sufficient Conditions for Collision-Resistant Hashing
Yuval Ishai
Eyal Kushilevitz
Rafail Ostrovsky
2005
TCC
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Minh-Huyen Nguyen
2005
TCC
The Universal Composable Security of Quantum Key Distribution
Michael Ben-Or
Michal Horodecki
Debbie W. Leung
Dominic Mayers
Jonathan Oppenheim
2005
TCC
Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings
2005
TCC
Toward Privacy in Public Databases
Shuchi Chawla
Cynthia Dwork
Frank McSherry
Adam Smith
Hoeteck Wee
2005
TCC
Universally Composable Privacy Amplification Against Quantum Adversaries
Renato Renner
Robert König
2005
TCC
Upper and Lower Bounds on Black-Box Steganography
Nenad Dedic
Gene Itkis
Leonid Reyzin
Scott Russell