Theory of cryptography: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
5978 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XII, 605 S. graph. Darst. 24 cm |
ISBN: | 9783642117985 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036035424 | ||
003 | DE-604 | ||
005 | 20100611 | ||
007 | t| | ||
008 | 100215s2010 xx d||| |||| 10||| eng d | ||
015 | |a 10,N06 |2 dnb | ||
016 | 7 | |a 1000036049 |2 DE-101 | |
020 | |a 9783642117985 |c kart. : EUR 84.53 (freier Pr.), sfr 123.00 (freier Pr.) |9 978-3-642-11798-5 | ||
024 | 3 | |a 9783642117985 | |
028 | 5 | 2 | |a 12990504 |
035 | |a (OCoLC)502033381 | ||
035 | |a (DE-599)DNB1000036049 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-11 |a DE-83 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 004 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Theory of cryptography |b 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings |c Daniele Micciancio (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XII, 605 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5978 | |
500 | |a Literaturangaben | ||
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Cryptography |v Congresses | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Zürich |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Micciancio, Daniele |e Sonstige |4 oth | |
710 | 2 | |a International Association for Cryptologic Research |e Sonstige |0 (DE-588)2085597-7 |4 oth | |
711 | 2 | |a Theory of Cryptography Conference |n 7 |d 2010 |c Zürich |j Sonstige |0 (DE-588)16056103-6 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5978 |w (DE-604)BV000000607 |9 5978 | |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3424009&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018927420&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-018927420 |
Datensatz im Suchindex
_version_ | 1820875199303647232 |
---|---|
adam_text |
RONALD CRAMER, DENNIS HOFHEINZ, AND EIKE KILTZ TABLE OF CONTENTS
PARALLEL REPETITION AN EFFICIENT PARALLEL REPETITION THEOREM 1 JOHAN
HASIAD, RAFAEL PASS. DOUGLAS WIKSTROEM. AND KRZYSZTOF PIETRZAK PARALLEL
REPETITION THEOREMS FOR INTERACTIVE ARGUMENTS 19 KAI-MIN CHUNG AND
FE.NG-HAO LIU ALMOST OPTIMAL BOUNDS FOR DIRECT PRODUCT THRESHOLD THEOREM
37 CHARANJIT S. JULIA OBFUSCATION ON SYMMETRIC ENCRYPTION AND POINT
OBFUSCATION 52 RAN CANETTI, YAEL TAUMAN KALAI, MAYANK VARIA, AND DANIEL
WICHS OBFIISCATION OF HYPERPLANE MEMBERSHIP 72 RAN CANETTI. GUY N.
ROTHBLUM, AND MAYANK VARIA INVITED TALK SECURE COMPUTATION AND ITS
DIVERSE APPLICATIONS 90 YUVAL ISHAI MULTIPARTY COMPUTATION ON COMPLETE
PRIMITIVES FOR FAIRNESS 91 DON GORDON. YUVAL ISHAI. TAL MORAN, RAFAIL
OSTRAVSKY, AND AMIT SAHAI ON THE NECESSARY AND SUFFICIENT ASSUMPTIONS
FOR UC COMPUTATION 109 VAN DAMGARD, JESPER BUUS NIELSEN, AND CLAUDIO
ORLANDI FROM PASSIVE TO COVERT SECURITY AT LOW COST 128 IVAN DAMGARD,
MARTIN GEISLER, AND JESPER BUUS NIELSEN CCA SECURITY A TWIST ON THE
NAOR-YUNG PARADIGM AND ITS APPLICATION TO EFFICIENT CCA-SECURE
ENCRYPTION FROM HARD SEARCH PROBLEMS 146 BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/1000036049 DIGITALISIERT DURCH X TABLE OF CONTENTS TWO
IS A CROWD? A BLACK-BOX SEPARATION OF ONE-WAYNESS AND SECURITY UNDER
CORRELATED INPUTS 165 YEVGENIY VAHLIS THRESHOLD CRYPTOGRAPHY AND SECRET
SHARING EFFICIENT. ROBUST AND CONSTANT-ROUND DISTRIBUTED RSA KEY
GENERATION 183 IVAN DAMGARD AND GERT L*SS0E MIKKELSEN THRESHOLD
DECRYPTION AND ZERO-KNOWLEDGE PROOFS FOR LATTICE-BASED CRYPTOSYSTEMS 201
RIKKE BENDLIN AND IVAN DAMGARD IDEAL HIERARCHICAL SECRET SHARING SCHEMES
219 ORIOL FARRAS AND CARLES PADRO SYMMETRIC CRYPTOGRAPHY A HARDCORE
LEMMA FOR COMPUTATIONAL INDISTINGUISHABILITY: SECURITY AMPLIFICATION FOR
ARBITRARILY WEAK PRGS WITH OPTIMAL STRETCH 237 UELI MAURER AND STEFANO
TESSARO ON RELATED-SECRET PSEUDORANDOMNESS 255 DAVID GOLDENBERG AND
MOSES LISKOV A DOMAIN EXTENDER FOR THE IDEAL CIPHER 273 JEAN-SEBASTIEN
CORON. YEVGENIY DODIS, AVRADIP MANDAI, AND YANNICK SEURIN DELAYED-KEY
MESSAGE AUTHENTICATION FOR STREAMS 290 MARC FISCHLIN AND ANJA LEHMANN
KEY-LEAKAGE AND TAMPER-RESISTANCE FOUNDING CRYPTOGRAPHY ON TAMPER-PROOF
HARDWARE TOKENS 308 VIPUL GOYAL. YUVAL ISHAI. AMIT SAHAI. RAMARATHNAM
VENKAT.ESAN, AND AKSHAY WADIA TRULY EFFICIENT STRING OBLIVIOUS TRANSFER
USING RESETTABLE TAMPER-PROOF TOKENS 327 VLADIMIR TABLE OF CONTENTS XI
PUBLIC-KEY ENCRYPTION SCHEMES WITH AUXILIARY INPUTS 361 YEVGENIY DODIS.
SHAFT GOLDWASSER, YAEL TAUMAN KALAI, CHRIS PEIKERT, AND VINOD
VAIKUNTANATHAN PUBLIC-KEY CRYPTOGRAPHIC PRIMITIVES PROVABLY AS SECURE AS
SUBSET SUM 382 VADIM LYUBASHEVSKY, ADRIANA PALACIO, AND GIL SEGEV
RATIONALITY AND PRIVACY RATIONALITY IN THE FULL-INFORMATION MODEL 401
RONEN GRADWOHL EFFICIENT RATIONAL SECRET SHARING IN STANDARD
COMMUNICATION NETWORKS 419 GEORG FUCHSBAUER, JONATHAN KATZ, AND DAVID
NACCACHE BOUNDS ON THE SAMPLE COMPLEXITY FOR PRIVATE LEARNING AND
PRIVATE DATA RELEASE 437 AMOS BEIMEL, SHIVA PRASAD KASIVISWANATHAN. AND
KOBBI NISSIM PUBLIC-KEY ENCRYPTION NEW TECHNIQUES FOR DUAL SYSTEM
ENCRYPTION AND FULLY SECURE HIBE WITH SHORT CIPHERTEXTS 455 ALLISON
LEWKO AND BRENT WATERS ROBUST ENCRYPTION 480 MICHEL ABDALLA. MIHIR
BELLARE, AND GREGORY NEVEN INVITED TALK PRIVACY-ENHANCING CRYPTOGRAPHY:
FROM THEORY INTO PRACTICE 498 JAN CAMENI.SCH ZERO-KNOWLEDGE CONCISE
MERCURIAL VECTOR COMMITMENTS AND INDEPENDENT ZERO-KNOWLEDGE SETS WITH
SHORT PROOFS I'M BENOIT LIBERT AND MOTI YUNG EYE FOR AN EYE: EFFICIENT
CONCURRENT ZERO-KNOWLEDGE IN THE TIMING MODE XII TABLE OF CONTENTS
EFFICIENCY PRESERVING TRANSFORMATIONS FOR CONCURRENT NON-MALLEABLE ZERO
KNOWLEDGE 535 RAFAIL OSTROVSKY, OMKANT PANDEY, AND IVAN VISCONTI
EFFICIENCY LIMITATIONS FOR I7-PROTOCOLS FOR GROUP HOMOMORPHISMS 553
ENDRE BANGERTER, JAN CAMENISCH, AND STEPHAN KRENN COMPOSITION OF
ZERO-KNOWLEDGE PROOFS WITH EFFICIENT PROVERS 572 ELEANOR BIRRELL AND
SALIL VADHAN PRIVATE COINS VERSUS PUBLIC COINS IN ZERO-KNOWLEDGE PROOF
SYSTEMS . 588 RAFAEL PASS AND MUTHURAMAKRISHNAN VENKITASUBRAMANIAM
AUTHOR INDEX 607 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV036035424 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)502033381 (DE-599)DNB1000036049 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036035424</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100611</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">100215s2010 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N06</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1000036049</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642117985</subfield><subfield code="c">kart. : EUR 84.53 (freier Pr.), sfr 123.00 (freier Pr.)</subfield><subfield code="9">978-3-642-11798-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642117985</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12990504</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)502033381</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1000036049</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Theory of cryptography</subfield><subfield code="b">7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings</subfield><subfield code="c">Daniele Micciancio (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 605 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5978</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Zürich</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Micciancio, Daniele</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Association for Cryptologic Research</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)2085597-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Theory of Cryptography Conference</subfield><subfield code="n">7</subfield><subfield code="d">2010</subfield><subfield code="c">Zürich</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16056103-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5978</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5978</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3424009&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018927420&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018927420</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Zürich gnd-content |
genre_facet | Konferenzschrift 2010 Zürich |
id | DE-604.BV036035424 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:11:50Z |
institution | BVB |
institution_GND | (DE-588)2085597-7 (DE-588)16056103-6 |
isbn | 9783642117985 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018927420 |
oclc_num | 502033381 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 |
physical | XII, 605 S. graph. Darst. 24 cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Theory of cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings Daniele Micciancio (ed.) Berlin [u.a.] Springer 2010 XII, 605 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5978 Literaturangaben Computer security Congresses Cryptography Congresses Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Zürich gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Micciancio, Daniele Sonstige oth International Association for Cryptologic Research Sonstige (DE-588)2085597-7 oth Theory of Cryptography Conference 7 2010 Zürich Sonstige (DE-588)16056103-6 oth Lecture notes in computer science 5978 (DE-604)BV000000607 5978 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3424009&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018927420&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Theory of cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings Lecture notes in computer science Computer security Congresses Cryptography Congresses Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)1071861417 |
title | Theory of cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings |
title_auth | Theory of cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings |
title_exact_search | Theory of cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings |
title_full | Theory of cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings Daniele Micciancio (ed.) |
title_fullStr | Theory of cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings Daniele Micciancio (ed.) |
title_full_unstemmed | Theory of cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings Daniele Micciancio (ed.) |
title_short | Theory of cryptography |
title_sort | theory of cryptography 7th theory of cryptography conference tcc 2010 zurich switzerland february 9 11 2010 proceedings |
title_sub | 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9 - 11, 2010 ; proceedings |
topic | Computer security Congresses Cryptography Congresses Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer security Congresses Cryptography Congresses Kryptologie Konferenzschrift 2010 Zürich |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3424009&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018927420&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT miccianciodaniele theoryofcryptography7ththeoryofcryptographyconferencetcc2010zurichswitzerlandfebruary9112010proceedings AT internationalassociationforcryptologicresearch theoryofcryptography7ththeoryofcryptographyconferencetcc2010zurichswitzerlandfebruary9112010proceedings AT theoryofcryptographyconferencezurich theoryofcryptography7ththeoryofcryptographyconferencetcc2010zurichswitzerlandfebruary9112010proceedings |