This book constitutes the refereed proceedings of the Third Theory of Cryptography Conference, TCC 2006, held in March 2006. The 31 revised full papers presented were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on zero-knowledge, primitives, assumptions and models, the bounded-retrieval model, privacy, secret sharing and multi-party computation, universally-composible security, one-way functions and friends, and pseudo-random functions and encryption.
This book constitutes the refereed proceedings of the Third Theory of Cryptography Conference, TCC 2006, held in March 2006. The 31 revised full pa...
CRYPTO2009, the29thAnnualInternationalCryptologyConference, wassp- soredbytheInternationalAssociationforCryptologicResearch(IACR) inco- eration with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara.The conference was held in Santa Barbara, California, during August 16-20, 2009, and John Black served as the General Chair. The Program Committeeconsistedof29membersandtwoadvisorymembers, whosenamesare listed on the next page, and I had the privilege of serving as the ProgramChair. The...
CRYPTO2009, the29thAnnualInternationalCryptologyConference, wassp- soredbytheInternationalAssociationforCryptologicResearch(IACR) inco- eration with t...