What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from TCC 2010
Year
Venue
Title
2010
TCC
A Domain Extender for the Ideal Cipher
Jean-Sébastien Coron
Yevgeniy Dodis
Avradip Mandal
Yannick Seurin
2010
TCC
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch
Ueli Maurer
Stefano Tessaro
2010
TCC
A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems
Ronald Cramer
Dennis Hofheinz
Eike Kiltz
2010
TCC
Almost Optimal Bounds for Direct Product Threshold Theorem
Charanjit S. Jutla
2010
TCC
An Efficient Parallel Repetition Theorem
Johan Håstad
Rafael Pass
Douglas Wikström
Krzysztof Pietrzak
2010
TCC
Bounds on the Sample Complexity for Private Learning and Private Data Release
Amos Beimel
Shiva Prasad Kasiviswanathan
Kobbi Nissim
2010
TCC
Composition of Zero-Knowledge Proofs with Efficient Provers
Eleanor Birrell
Salil P. Vadhan
2010
TCC
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs
Benoît Libert
Moti Yung
2010
TCC
Delayed-Key Message Authentication for Streams
Marc Fischlin
Anja Lehmann
2010
TCC
Efficiency Limitations for Σ-Protocols for Group Homomorphisms
Endre Bangerter
Jan Camenisch
Stephan Krenn
2010
TCC
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge
Rafail Ostrovsky
Omkant Pandey
Ivan Visconti
2010
TCC
Efficient Rational Secret Sharing in Standard Communication Networks
Georg Fuchsbauer
Jonathan Katz
David Naccache
2010
TCC
Efficient, Robust and Constant-Round Distributed RSA Key Generation
Ivan Damgård
Gert Læssøe Mikkelsen
2010
TCC
Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model
Rafael Pass
Wei-Lung Dustin Tseng
Muthuramakrishnan Venkitasubramaniam
2010
TCC
Founding Cryptography on Tamper-Proof Hardware Tokens
Vipul Goyal
Yuval Ishai
Amit Sahai
Ramarathnam Venkatesan
Akshay Wadia
2010
TCC
From Passive to Covert Security at Low Cost
Ivan Damgård
Martin Geisler
Jesper Buus Nielsen
2010
TCC
Ideal Hierarchical Secret Sharing Schemes
Oriol Farràs
Carles Padró
2010
TCC
Leakage-Resilient Signatures
Sebastian Faust
Eike Kiltz
Krzysztof Pietrzak
Guy N. Rothblum
2010
TCC
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
Allison B. Lewko
Brent Waters
2010
TCC
Obfuscation of Hyperplane Membership
Ran Canetti
Guy N. Rothblum
Mayank Varia
2010
TCC
On Complete Primitives for Fairness
S. Dov Gordon
Yuval Ishai
Tal Moran
Rafail Ostrovsky
Amit Sahai
2010
TCC
On Related-Secret Pseudorandomness
David Goldenberg
Moses Liskov
2010
TCC
On Symmetric Encryption and Point Obfuscation
Ran Canetti
Yael Tauman Kalai
Mayank Varia
Daniel Wichs
2010
TCC
On the Necessary and Sufficient Assumptions for UC Computation
Ivan Damgård
Jesper Buus Nielsen
Claudio Orlandi
2010
TCC
Parallel Repetition Theorems for Interactive Arguments
★
Best Student Paper
Kai-Min Chung
Feng-Hao Liu
2010
TCC
Privacy-Enhancing Cryptography: From Theory into Practice
★
Invited paper
Jan Camenisch
2010
TCC
Private Coins versus Public Coins in Zero-Knowledge Proof Systems
Rafael Pass
Muthuramakrishnan Venkitasubramaniam
2010
TCC
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
Vadim Lyubashevsky
Adriana Palacio
Gil Segev
2010
TCC
Public-Key Encryption Schemes with Auxiliary Inputs
Yevgeniy Dodis
Shafi Goldwasser
Yael Tauman Kalai
Chris Peikert
Vinod Vaikuntanathan
2010
TCC
Rationality in the Full-Information Model
Ronen Gradwohl
2010
TCC
Robust Encryption
Michel Abdalla
Mihir Bellare
Gregory Neven
2010
TCC
Secure Computation and Its Diverse Applications
★
Invited paper
Yuval Ishai
2010
TCC
Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
2010
TCC
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
Rikke Bendlin
Ivan Damgård
2010
TCC
Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens
Vladimir Kolesnikov
2010
TCC
Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs
Yevgeniy Vahlis