Theory of cryptography = 14th Intern...
Theory of Cryptography Conference (2016 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Theory of cryptography = 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.. Part I /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Theory of cryptography/ edited by Martin Hirt, Adam Smith.
    Reminder of title: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.
    remainder title: TCC 2016-B
    other author: Hirt, Martin.
    corporate name: Theory of Cryptography Conference
    Published: Berlin, Heidelberg :Springer Berlin Heidelberg : : 2016.,
    Description: xvi, 692 p. :ill., digital ;24 cm.
    [NT 15003449]: TCC Test-of-Time Award -- From Indifferentiability to Constructive Cryptography (and Back) -- Foundations -- Fast Pseudorandom Functions Based on Expander Graphs -- 3-Message Zero Knowledge Against Human Ignorance -- The GGM Function Family is a Weakly One-Way Family of Functions -- On the (In)security of SNARKs in the Presence of Oracles -- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting -- Simulating Auxiliary Inputs, Revisited -- Unconditional Security -- Pseudoentropy: Lower-bounds for Chain rules and Transformations -- Oblivious Transfer from Any Non-Trivial Elastic Noisy Channel via Secret Key Agreement -- Simultaneous Secrecy and Reliability Amplification for a General Channel Model -- Proof of Space from Stacked Expanders -- Perfectly Secure Message Transmission in Two Rounds -- Foundations of Multi-Party Protocols -- Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious -- Binary AMD Circuits from Secure Multiparty Computation -- Composable Security in the Tamper-Proof Hardware Model under Minimal Complexity -- Composable Adaptive Secure Protocols without Setup under Polytime Assumptions -- Adaptive Security of Yao's Garbled Circuits -- Round Complexity and Efficiency of Multi-Party Computation -- Efficient Secure Multiparty Computation with Identifiable Abort -- Secure Multiparty RAM Computation in Constant Rounds -- Constant-Round Maliciously Secure Two-Party Computation in the RAM Model -- More Efficient Constant-Round Multi-Party Computation from BMR and SHE -- Cross&Clean: Amortized Garbled Circuits With Constant Overhead -- Differential Privacy -- Separating Computational and Statistical Differential Privacy in the Client-Server Model -- Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds -- Strong Hardness of Privacy from Weak Traitor Tracing.
    Contained By: Springer eBooks
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: http://dx.doi.org/10.1007/978-3-662-53641-4
    ISBN: 9783662536414
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login