Theory of cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19 - 21, 2012 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2012
Schriftenreihe:Lecture notes in computer science 7194
Schlagworte:
Online-Zugang:Inhaltstext
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV039981150
003 DE-604
005 20121107
007 t|
008 120326s2012 xx d||| |||| 10||| eng d
015 |a 12,N09  |2 dnb 
016 7 |a 1019948256  |2 DE-101 
020 |a 3642289134  |9 3-642-28913-4 
020 |a 9783642289132  |c kart. : ca. EUR 84.53 (DE, freier Pr.), ca. EUR 86.90 (AT, freier Pr.), ca. sfr 105.50 (freier Pr.)  |9 978-3-642-28913-2 
024 3 |a 9783642289132 
028 5 2 |a Best.-Nr.: 86079552 
035 |a (OCoLC)785858291 
035 |a (DE-599)DNB1019948256 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
049 |a DE-706  |a DE-11  |a DE-83  |a DE-91G 
082 0 |a 005.82  |2 22/ger 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a 004  |2 sdnb 
084 |a DAT 465f  |2 stub 
245 1 0 |a Theory of cryptography  |b 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19 - 21, 2012 ; proceedings  |c Ronald Cramer (ed.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2012 
300 |a XIV, 656 S.  |b graph. Darst.  |c 21 cm 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 7194 
500 |a Literaturangaben 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2011  |z Providence RI  |2 gnd-content 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2012  |z Taormina  |2 gnd-content 
689 0 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 |5 DE-604 
700 1 |a Cramer, Ronald  |e Sonstige  |4 oth 
710 2 |a International Association for Cryptologic Research  |e Sonstige  |0 (DE-588)2085597-7  |4 oth 
711 2 |a Theory of Cryptography Conference  |n 9  |d 2012  |c Taormina  |j Sonstige  |0 (DE-588)16344458-4  |4 oth 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-3-642-28914-9 
830 0 |a Lecture notes in computer science  |v 7194  |w (DE-604)BV000000607  |9 7194 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=3981606&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024838487&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-024838487 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102 DAT 001z 2001 A 999
DE-BY-TUM_katkey 1856497
DE-BY-TUM_location 01
DE-BY-TUM_media_number 040071415542
_version_ 1820896017958043648
adam_text IMAGE 1 TABLE O F CONTENTS SECURE COMPUTATION COMPUTING ON AUTHENTICATED D A T A 1 JAE HYUN AHN, DAN BONEH, JAN CAMENISCH, SUSAN HOHENBERGER, ABHI SHELAT, AND BRENT WATERS IDENTIFYING CHEATERS WITHOUT AN HONEST MAJORITY 21 YUVAL ISHAI, RAFAIL OSTROVSKY, AND HAKAN SEYALIOGLU ON THE SECURITY OF THE FREE-XOR TECHNIQUE 39 SEUNG GEOL CHOI, JONATHAN KATZ, RANJIT KUMARESAN, AND HONG-SHENG ZHOU SECURE TWO-PARTY COMPUTATION WITH LOW COMMUNICATION 54 IVAN DAMGARD, SEBASTIAN FAUST, AND CARMIT HAZAY (BLIND) SIGNATURES AND THRESHOLD ENCRYPTION NON-INTERACTIVE CCA-SECURE THRESHOLD CRYPTOSYSTEMS WITH ADAPTIVE SECURITY: NEW FRAMEWORK AND CONSTRUCTIONS 75 BENOIT LIBERT AND MOTI YUNG ROUND-OPTIMAL PRIVACY-PRESERVING PROTOCOLS WITH SMOOTH PROJECTIVE HASH FUNCTIONS 94 OLIVIER BLAZY, DAVID POINTCHEVAL, AND DAMIEN VERGNAUD ON THE INSTANTIABILITY OF HASH-AND-SIGN RSA SIGNATURES 112 YEVGENIY DODIS, IFTACH HAITNER, AND ARIS TENTES BEYOND THE LIMITATION OF PRIME-ORDER BILINEAR GROUPS, AND ROUND OPTIMAL BLIND SIGNATURES 133 JAE HONG SEO AND JUNG HEE CHEON ZERO-KNOWLEDGE AND SECURITY M O D E L S ON EFFICIENT ZERO-KNOWLEDGE P C P S 151 YUVAL ISHAI, MOHAMMAD MAHMOODY, AND A M I T SAHAI PROGRESSION-FREE SETS AND SUBLINEAR PAIRING-BASED NON-INTERACTIVE ZERO-KNOWLEDGE ARGUMENTS 169 HELGER LIPMAA POINT OBFUSCATION AND 3-ROUND ZERO-KNOWLEDGE 190 N I R BITANSKY AND OMER PANETH HTTP://D-NB.INFO/1019948256 IMAGE 2 XII TABLE OF CONTENTS CONFIDENTIALITY AND INTEGRITY: A CONSTRUCTIVE PERSPECTIVE 209 UELI MAURER, ANDREAS RIIEDLINGER, AND BJORN TACKMANN LEAKAGE-RESILIENCE LEAKAGE-RESILIENT CIRCUITS WITHOUT COMPUTATIONAL ASSUMPTIONS 230 STEFAN DZIEMBOWSKI AND SEBASTIAN FAUST A PARALLEL REPETITION THEOREM FOR LEAKAGE RESILIENCE 248 ZVIKA BRAKERSKI AND YAEL TAUMAN KALAI LEAKAGE-TOLERANT INTERACTIVE PROTOCOLS 266 N I R BITANSKY, RAN CANETTI, AND SHAI HALEVI H A S H FUNCTIONS ON THE PUBLIC INDIFFERENTIABILITY AND CORRELATION INTRACTABILITY OF THE 6-ROUND FEISTEL CONSTRUCTION 285 AVRADIP MANDAL, JACQUES PATARIN, AND YANNICK SEURIN COLLISIONS ARE NOT INCIDENTAL: A COMPRESSION FUNCTION EXPLOITING DISCRETE GEOMETRY 303 DIMITAR JETCHEV, ONUR OZEN, AND MARTIJN S T A M DIFFERENTIAL PRIVACY LOWER BOUNDS IN DIFFERENTIAL PRIVACY 321 ANINDYA DE ITERATIVE CONSTRUCTIONS AND PRIVATE D A T A RELEASE 339 ANUPAM GUPTA, AARON ROTH, AND JONATHAN ULLMAN P S E U D O R A N D O M N E S S I FROM NON-ADAPTIVE TO ADAPTIVE PSEUDORANDOM FUNCTIONS 357 ITAY BERMAN AND IFTACH HAITNER HARDNESS PRESERVING CONSTRUCTIONS OF PSEUDORANDOM FUNCTIONS 369 ABHISHEK JAIN, KRZYSZTOF PIETRZAK, AND ARIS TENTES COMPUTATIONAL EXTRACTORS AND PSEUDORANDOMNESS 383 DANA DACHMAN-SOLED, ROSARIO GENNARO, HUGO KRAWCZYK, AND TAL MALKIN IMAGE 3 TABLE OF CONTENTS XIII D E D I C A T E D ENCRYPTION I FUNCTIONAL RE-ENCRYPTION AND COLLUSION-RESISTANT OBFUSCATION 404 NISHANTH CHANDRAN, MELISSA CHASE, AND VINOD VAIKUNTANATHAN HOW TO DELEGATE AND VERIFY IN PUBLIC: VERIFIABLE COMPUTATION FROM ATTRIBUTE-BASED ENCRYPTION 422 BRYAN PARNO, MARIANA RAYKOVA, AND VINOD VAIKUNTANATHAN ON BLACK-BOX REDUCTIONS BETWEEN PREDICATE ENCRYPTION SCHEMES 440 VIPUL GOYAL, VIRENDRA KUMAR, SATYA LOKAM, AND MOHAMMAD MAHMOODY SECURITY AMPLIFICATION LOSSY FUNCTIONS DO NOT AMPLIFY WELL 458 KRZYSZTOF PIETRZAK, ALON ROSEN, AND GIL SEGEV COUNTEREXAMPLES T O HARDNESS AMPLIFICATION BEYOND NEGLIGIBLE 476 YEVGENIY DODIS, ABHISHEK JAIN, TAL MORAN, AND DANIEL WICHS R E S E T T A B L E AND PARALLEL ZERO KNOWLEDGE RESETTABLE STATISTICAL ZERO KNOWLEDGE 494 SANJAM GARG, RAFAIL OSTROVSKY, IVAN VISCONTI, AND AKSHAY WADIA THE KNOWLEDGE TIGHTNESS OF PARALLEL ZERO-KNOWLEDGE 512 KAI-MIN CHUNG, RAFAEL PASS, AND WEI-LUNG DUSTIN TSENG SIMULTANEOUSLY RESETTABLE ARGUMENTS OF KNOWLEDGE 530 CHONGWON CHO, RAFAIL OSTROVSKY, ALESSANDRA SCAFURO, AND IVAN VISCONTI D E D I C A T E D ENCRYPTION II SUBSPACE LWE 548 KRZYSZTOF PIETRZAK BOUNDED-COLLUSION IBE FROM KEY HOMOMORPHISM 564 SHAFI GOLDWASSER, ALLISON LEWKO, AND DAVID A. WILSON A UNIFIED APPROACH TO DETERMINISTIC ENCRYPTION: NEW CONSTRUCTIONS AND A CONNECTION TO COMPUTATIONAL ENTROPY 582 BENJAMIN FULLER, ADAM O NEILL, AND LEONID REYZIN IMAGE 4 XIV TABLE OF CONTENTS P S E U D O R A N D O M N E S S II A DICHOTOMY FOR LOCAL SMALL-BIAS GENERATORS 600 BENNY APPLEBAUM, ANDREJ BOGDANOV, AND ALON ROSEN RANDOMNESS CONDENSERS FOR EFFICIENTLY SAMPLABLE, SEED-DEPENDENT SOURCES 618 YEVGENIY DODIS, THOMAS RISTENPART, AND SALIL VADHAN UNIQUENESS IS A DIFFERENT STORY: IMPOSSIBILITY OF VERIFIABLE RANDOM FUNCTIONS FROM TRAPDOOR PERMUTATIONS 636 DARIO FIORE AND DOMINIQUE SCHRODER A U T H O R I N D E X 655
any_adam_object 1
building Verbundindex
bvnumber BV039981150
classification_rvk SS 4800
classification_tum DAT 465f
ctrlnum (OCoLC)785858291
(DE-599)DNB1019948256
dewey-full 005.82
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.82
dewey-search 005.82
dewey-sort 15.82
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02369nam a2200517 cb4500</leader><controlfield tag="001">BV039981150</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121107 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120326s2012 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N09</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1019948256</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642289134</subfield><subfield code="9">3-642-28913-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642289132</subfield><subfield code="c">kart. : ca. EUR 84.53 (DE, freier Pr.), ca. EUR 86.90 (AT, freier Pr.), ca. sfr 105.50 (freier Pr.)</subfield><subfield code="9">978-3-642-28913-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642289132</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86079552</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)785858291</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1019948256</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Theory of cryptography</subfield><subfield code="b">9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19 - 21, 2012 ; proceedings</subfield><subfield code="c">Ronald Cramer (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 656 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">21 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7194</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Providence RI</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Taormina</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cramer, Ronald</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Association for Cryptologic Research</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)2085597-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Theory of Cryptography Conference</subfield><subfield code="n">9</subfield><subfield code="d">2012</subfield><subfield code="c">Taormina</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16344458-4</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-28914-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7194</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7194</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3981606&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=024838487&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024838487</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2011 Providence RI gnd-content
(DE-588)1071861417 Konferenzschrift 2012 Taormina gnd-content
genre_facet Konferenzschrift 2011 Providence RI
Konferenzschrift 2012 Taormina
id DE-604.BV039981150
illustrated Illustrated
indexdate 2024-12-24T02:36:37Z
institution BVB
institution_GND (DE-588)2085597-7
(DE-588)16344458-4
isbn 3642289134
9783642289132
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-024838487
oclc_num 785858291
open_access_boolean
owner DE-706
DE-11
DE-83
DE-91G
DE-BY-TUM
owner_facet DE-706
DE-11
DE-83
DE-91G
DE-BY-TUM
physical XIV, 656 S. graph. Darst. 21 cm
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Theory of cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19 - 21, 2012 ; proceedings
Lecture notes in computer science
Kryptologie (DE-588)4033329-2 gnd
subject_GND (DE-588)4033329-2
(DE-588)1071861417
title Theory of cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19 - 21, 2012 ; proceedings
title_auth Theory of cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19 - 21, 2012 ; proceedings
title_exact_search Theory of cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19 - 21, 2012 ; proceedings
title_full Theory of cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19 - 21, 2012 ; proceedings Ronald Cramer (ed.)
title_fullStr Theory of cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19 - 21, 2012 ; proceedings Ronald Cramer (ed.)
title_full_unstemmed Theory of cryptography 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19 - 21, 2012 ; proceedings Ronald Cramer (ed.)
title_short Theory of cryptography
title_sort theory of cryptography 9th theory of cryptography conference tcc 2012 taormina sicily italy march 19 21 2012 proceedings
title_sub 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19 - 21, 2012 ; proceedings
topic Kryptologie (DE-588)4033329-2 gnd
topic_facet Kryptologie
Konferenzschrift 2011 Providence RI
Konferenzschrift 2012 Taormina
url http://deposit.dnb.de/cgi-bin/dokserv?id=3981606&prov=M&dok_var=1&dok_ext=htm
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024838487&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV000000607
work_keys_str_mv AT cramerronald theoryofcryptography9ththeoryofcryptographyconferencetcc2012taorminasicilyitalymarch19212012proceedings
AT internationalassociationforcryptologicresearch theoryofcryptography9ththeoryofcryptographyconferencetcc2012taorminasicilyitalymarch19212012proceedings
AT theoryofcryptographyconferencetaormina theoryofcryptography9ththeoryofcryptographyconferencetcc2012taorminasicilyitalymarch19212012proceedings