Theory of cryptography: 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
6597 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XII, 629 S. 235 mm x 155 mm |
ISBN: | 9783642195709 3642195709 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV037292769 | ||
003 | DE-604 | ||
005 | 20110523 | ||
007 | t| | ||
008 | 110322s2011 xx |||| 10||| eng d | ||
015 | |a 11,N07 |2 dnb | ||
016 | 7 | |a 1009990705 |2 DE-101 | |
020 | |a 9783642195709 |c Pb. : EUR 84.53 (DE) (freier Pr.), sfr 113.50 (freier Pr.) |9 978-3-642-19570-9 | ||
020 | |a 3642195709 |c Pb. : EUR 84.53 (DE) (freier Pr.), sfr 113.50 (freier Pr.) |9 3-642-19570-9 | ||
024 | 3 | |a 9783642195709 | |
028 | 5 | 2 | |a Best.-Nr.: 80036493 |
035 | |a (OCoLC)711869390 | ||
035 | |a (DE-599)DNB1009990705 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-11 |a DE-83 | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Theory of cryptography |b 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings |c Yuval Ishai (ed.)[International Assoc. for Cryptologic Research] |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XII, 629 S. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6597 | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Providence RI |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ishai, Yuval |e Sonstige |4 oth | |
710 | 2 | |a International Association for Cryptologic Research |e Sonstige |0 (DE-588)2085597-7 |4 oth | |
711 | 2 | |a Theory of Cryptography Conference |n 8 |d 2011 |c Providence, RI |j Sonstige |0 (DE-588)16105174-1 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Theory of Cryptography |
830 | 0 | |a Lecture notes in computer science |v 6597 |w (DE-604)BV000000607 |9 6597 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3669469&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021205310&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-021205310 |
Datensatz im Suchindex
_version_ | 1820875297351794688 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
HARDNESS AMPLIFICATION INPUT LOCALITY AND HARDNESS AMPLIFICATION 1
ANDREJ BOGDANOV AND ALON ROSEN
GENERAL HARDNESS AMPLIFICATION OF PREDICATES AND PUZZLES 19
THOMAS HOLENSTEIN AND GRANT SCHOENEBECK
SECURITY AMPLIFICATION FOR THE CASCADE OF ARBITRARILY WEAK PRPS: TIGHT
BOUNDS VIA THE INTERACTIVE HARDCORE LEMMA 37
STEFANO TESSARO
INVITED TALK 1
DENSE MODEL THEOREMS AND THEIR APPLICATIONS 55
LUCA TREVISAN
LEAKAGE RESILIENCE
PARALLEL REPETITION FOR LEAKAGE RESILIENCE AMPLIFICATION REVISITED 58
ABHISHEK JAIN AND KRZYSZTOF PIETRZAK
ACHIEVING LEAKAGE RESILIENCE THROUGH DUAL SYSTEM ENCRYPTION 70 ALLISON
LEWKO, YANNIS ROUSELAKIS, AND BRENT WATERS
SIGNATURES RESILIENT TO CONTINUAL LEAKAGE ON MEMORY AND COMPUTATION 89
TAL MALKIN, ISAMU TERANISHI, YEVGENIY VAHLIS, AND MOTI YUNG
AFTER-THE-FACT LEAKAGE IN PUBLIC-KEY ENCRYPTION 107
SHAI HALEVI AND HUIJIA LIN
TAMPER RESILIENCE
ONE-TIME COMPUTABLE SELF-ERASING FUNCTIONS 125
STEFAN DZIEMBOWSKI, TOMASZ KAZANA, AND DANIEL WICHS
PERFECTLY SECURE OBLIVIOUS RAM WITHOUT RANDOM ORACLES 144
IVAN DAMGAERD, SIGURD MELDGAARD, AND JESPER BUUS NIELSEN
UNCONDITIONAL AND COMPOSABLE SECURITY USING A SINGLE STATEFUL
TAMPER-PROOF HARDWARE TOKEN 164
NICO DOETTLING, DANIEL KRASCHEWSKI, AND JOERN MUELLER-QUADE
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1009990705
DIGITALISIERT DURCH
IMAGE 2
X TABLE OF CONTENTS
CORRELATED-INPUT SECURE HASH FUNCTIONS 182
VIPUL GOYAL, ADAM O'NEILL, AND VANISHREE RAO
ENCRYPTION
BLACK-BOX CIRCULAR-SECURE ENCRYPTION BEYOND AFFINE FUNCTIONS 201 ZVIKA
BRAKERSKI, SHAFI GOLDWASSER, AND YAEL TAUMAN KALAI
HOMOMORPHIC ENCRYPTION: FROM PRIVATE-KEY TO PUBLIC-KEY 219 RON ROTHBLUM
I D E N T I T Y - B A S ED E N C R Y P T I ON S E C U RE A G A I N ST S
E L E C T I VE O P E N I NG A T T A CK . . . 2 35
MIHIR BELLARE, BRENT WATERS, AND SCOTT YILEK
FUNCTIONAL ENCRYPTION: DEFINITIONS AND CHALLENGES 253 DAN BONEH, AMIT
SAHAI, AND BRENT WATERS
COMPOSABLE SECURITY
CONCURRENT NON-MALLEABLE ZERO KNOWLEDGE WITH ADAPTIVE INPUTS 274 HUIJIA
LIN AND RAFAEL PASS
ROUND-OPTIMAL PASSWORD-BASED AUTHENTICATED KEY EXCHANGE 293 JONATHAN
KATZ AND VINOD VAIKUNTANATHAN
BRINGING PEOPLE OF DIFFERENT BELIEFS TOGETHER TO DO UC 311 SANJAM GARG,
VIPUL GOYAL, ABHISHEK JAIN, AND AMIT SAHAI
SECURE COMPUTATION
SECURE TWO-PARTY COMPUTATION VIA CUT-AND-CHOOSE OBLIVIOUS TRANSFER 329
YEHUDA LINDELL AND BENNY PINKAS
PRACTICAL ADAPTIVE OBLIVIOUS TRANSFER FROM SIMPLE ASSUMPTIONS 347
MATTHEW GREEN AND SUSAN HOHENBERGER
COMPLETENESS THEOREMS WITH CONSTRUCTIVE PROOFS FOR FINITE DETERMINISTIC
2-PARTY FUNCTIONS 364
DANIEL KRASCHEWSKI AND JOERN MUELLER-QUADE
A ZERO-ONE LAW FOR SECURE MULTI-PARTY COMPUTATION WITH TERNARY OUTPUTS
382
GUNNAR KREITZ
IMAGE 3
TABLE OF CONTENTS XI
PRIVACY
PCPS AND THE HARDNESS OF GENERATING PRIVATE SYNTHETIC DATA 400 JONATHAN
ULLMAN AND SALIL VADHAN
LIMITS OF COMPUTATIONAL DIFFERENTIAL PRIVACY IN THE CLIENT/SERVER
SETTING 417
ADAM GROCE, JONATHAN KATZ, AND ARKADY YERUKHIMOVICH
TOWARDS PRIVACY FOR SOCIAL NETWORKS: A ZERO-KNOWLEDGE BASED DEFINITION
OF PRIVACY 432
JOHANNES GEHRKE, EDWARD LUI, AND RAFAEL PASS
COIN TOSSING AND PSEUDORANDOMNESS
ON THE BLACK-BOX COMPLEXITY OF OPTIMALLY-FAIR COIN TOSSING 450 DANA
DACHMAN-SOLED, YEHUDA LINDELL, MOHAMMAD MAHMOODY, AND TAL MALKIN
TIGHT BOUNDS FOR CLASSICAL AND QUANTUM COIN FLIPPING 468
ESTHER HAENGGI AND JIIRG WULLSCHLEGER
EXPLORING THE LIMITS OF COMMON COINS USING FRONTIER ANALYSIS OF
PROTOCOLS 486
HEMANTA K. MAJI, PICHAYOOT OUPPAPHAN, MANOJ PRABHAKARAN, AND MIKE
ROSULEK
LIMITS ON THE STRETCH OF NON-ADAPTIVE CONSTRUCTIONS OF PSEUDO-RANDOM
GENERATORS 504
JOSH BRONSON, AH JUMA, AND PERIKLIS A. PAPAKONSTANTINOU
ON THE COMPLEXITY OF NON-ADAPTIVELY INCREASING THE STRETCH OF
PSEUDORANDOM GENERATORS 522
ERIC MILES AND EMANUELE VIOLA
INVITED TALK 2
CONCURRENT SECURITY AND NON-MALLEABILITY (ABSTRACT) 540
RAFAEL PASS
BLACK-BOX CONSTRUCTIONS AND SEPARATIONS
(NEARLY) ROUND-OPTIMAL BLACK-BOX CONSTRUCTIONS OF COMMITMENTS SECURE
AGAINST SELECTIVE OPENING ATTACKS 541
DAVID XIAO
IMAGE 4
XII TABLE OF CONTENTS
LIMITS ON THE POWER OF ZERO-KNOWLEDGE PROOFS IN CRYPTOGRAPHIC
CONSTRUCTIONS 559
ZVIKA BRAKERSKI, JONATHAN KATZ, GIL SEGEV, AND ARKADY YERUKHIMOVICH
TOWARDS NON-BLACK-BOX LOWER BOUNDS IN CRYPTOGRAPHY 579 RAFAEL PASS,
WEI-LUNG DUSTIN TSENG, AND MUTHURAMAKRISHNAN VENKITASUBRAMANIAM
BLACK-BOX SEPARATIONS
ON BLACK-BOX SEPARATIONS AMONG INJECTIVE ONE-WAY FUNCTIONS 597 TAKAHIRO
MATSUDA AND KANTA MATSUURA
IMPOSSIBILITY OF BLIND SIGNATURES FROM ONE-WAY PERMUTATIONS 615 JONATHAN
KATZ, DOMINIQUE SCHROEDER, AND ARKADY YERUKHIMOVICH
AUTHOR INDEX 631 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV037292769 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)711869390 (DE-599)DNB1009990705 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV037292769</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110523</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">110322s2011 xx |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N07</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1009990705</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642195709</subfield><subfield code="c">Pb. : EUR 84.53 (DE) (freier Pr.), sfr 113.50 (freier Pr.)</subfield><subfield code="9">978-3-642-19570-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642195709</subfield><subfield code="c">Pb. : EUR 84.53 (DE) (freier Pr.), sfr 113.50 (freier Pr.)</subfield><subfield code="9">3-642-19570-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642195709</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80036493</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)711869390</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1009990705</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Theory of cryptography</subfield><subfield code="b">8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings</subfield><subfield code="c">Yuval Ishai (ed.)[International Assoc. for Cryptologic Research]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 629 S.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6597</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Providence RI</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ishai, Yuval</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Association for Cryptologic Research</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)2085597-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Theory of Cryptography Conference</subfield><subfield code="n">8</subfield><subfield code="d">2011</subfield><subfield code="c">Providence, RI</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16105174-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Theory of Cryptography</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6597</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6597</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3669469&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021205310&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-021205310</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Providence RI gnd-content |
genre_facet | Konferenzschrift 2011 Providence RI |
id | DE-604.BV037292769 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:13:23Z |
institution | BVB |
institution_GND | (DE-588)2085597-7 (DE-588)16105174-1 |
isbn | 9783642195709 3642195709 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-021205310 |
oclc_num | 711869390 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 |
physical | XII, 629 S. 235 mm x 155 mm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Theory of cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings Yuval Ishai (ed.)[International Assoc. for Cryptologic Research] Berlin [u.a.] Springer 2011 XII, 629 S. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6597 Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 Providence RI gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Ishai, Yuval Sonstige oth International Association for Cryptologic Research Sonstige (DE-588)2085597-7 oth Theory of Cryptography Conference 8 2011 Providence, RI Sonstige (DE-588)16105174-1 oth Erscheint auch als Online-Ausgabe Theory of Cryptography Lecture notes in computer science 6597 (DE-604)BV000000607 6597 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3669469&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021205310&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Theory of cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings Lecture notes in computer science Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)1071861417 |
title | Theory of cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings |
title_auth | Theory of cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings |
title_exact_search | Theory of cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings |
title_full | Theory of cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings Yuval Ishai (ed.)[International Assoc. for Cryptologic Research] |
title_fullStr | Theory of cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings Yuval Ishai (ed.)[International Assoc. for Cryptologic Research] |
title_full_unstemmed | Theory of cryptography 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings Yuval Ishai (ed.)[International Assoc. for Cryptologic Research] |
title_short | Theory of cryptography |
title_sort | theory of cryptography 8th theory of cryptography conference tcc 2011 providence ri usa march 28 30 2011 proceedings |
title_sub | 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28 - 30, 2011 ; proceedings |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie Konferenzschrift 2011 Providence RI |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3669469&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021205310&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT ishaiyuval theoryofcryptography8ththeoryofcryptographyconferencetcc2011providenceriusamarch28302011proceedings AT internationalassociationforcryptologicresearch theoryofcryptography8ththeoryofcryptographyconferencetcc2011providenceriusamarch28302011proceedings AT theoryofcryptographyconferenceprovidenceri theoryofcryptography8ththeoryofcryptographyconferencetcc2011providenceriusamarch28302011proceedings |