Login / Signup
TCC (A2)
2016
2016
2016
Keyphrases
Publications
2016
Mihir Bellare
,
Igors Stepanovs
Point-Function Obfuscation: A Framework and Generic Constructions.
TCC (A2)
(2016)
Srinivas Devadas
,
Marten van Dijk
,
Christopher W. Fletcher
,
Ling Ren
,
Elaine Shi
,
Daniel Wichs
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM.
TCC (A2)
(2016)
Michele Ciampi
,
Giuseppe Persiano
,
Luisa Siniscalchi
,
Ivan Visconti
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles.
TCC (A2)
(2016)
Elette Boyle
,
Kai-Min Chung
,
Rafael Pass
Oblivious Parallel RAM and Applications.
TCC (A2)
(2016)
Eli Ben-Sasson
,
Alessandro Chiesa
,
Ariel Gabizon
,
Madars Virza
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs.
TCC (A2)
(2016)
Hoeteck Wee
Déjà Q: Encore! Un Petit IBE.
TCC (A2)
(2016)
Siyao Guo
,
Pavel Hubácek
,
Alon Rosen
,
Margarita Vald
Rational Sumchecks.
TCC (A2)
(2016)
Michele Ciampi
,
Giuseppe Persiano
,
Alessandra Scafuro
,
Luisa Siniscalchi
,
Ivan Visconti
Improved OR-Composition of Sigma-Protocols.
TCC (A2)
(2016)
Stefan Dziembowski
,
Sebastian Faust
,
Maciej Skórski
Optimal Amplification of Noisy Leakages.
TCC (A2)
(2016)
Sanjam Garg
,
Craig Gentry
,
Shai Halevi
,
Mark Zhandry
Functional Encryption Without Obfuscation.
TCC (A2)
(2016)
Yuval Ishai
,
Mor Weiss
,
Guang Yang
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits.
TCC (A2)
(2016)
Gilad Asharov
,
Gil Segev
On Constructing One-Way Permutations from Indistinguishability Obfuscation.
TCC (A2)
(2016)
Benny Applebaum
,
Pavel Raykov
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back.
TCC (A2)
(2016)
Mark Zhandry
How to Avoid Obfuscation Using Witness PRFs.
TCC (A2)
(2016)
Allison Bishop
,
Yevgeniy Dodis
Interactive Coding for Interactive Proofs.
TCC (A2)
(2016)
Nishanth Chandran
,
Bhavana Kanukurthi
,
Srinivasan Raghuraman
Information-Theoretic Local Non-malleable Codes and Their Applications.
TCC (A2)
(2016)
Shashank Agrawal
,
Melissa Chase
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups.
TCC (A2)
(2016)
Divesh Aggarwal
,
Shashank Agrawal
,
Divya Gupta
,
Hemanta K. Maji
,
Omkant Pandey
,
Manoj Prabhakaran
Optimal Computational Split-state Non-malleable Codes.
TCC (A2)
(2016)
Binyi Chen
,
Huijia Lin
,
Stefano Tessaro
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions.
TCC (A2)
(2016)
Mihir Bellare
,
Igors Stepanovs
,
Stefano Tessaro
Contention in Cryptoland: Obfuscation, Leakage and UCE.
TCC (A2)
(2016)
Ilan Komargodski
,
Mark Zhandry
Cutting-Edge Cryptography Through the Lens of Secret Sharing.
TCC (A2)
(2016)
volume 9563, 2016
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II
TCC (A2)
9563 (2016)