default search action
17th TCC 2019: Nuremberg, Germany
- Dennis Hofheinz, Alon Rosen:
Theory of Cryptography - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11891, Springer 2019, ISBN 978-3-030-36029-0 - Chris Peikert, Zachary Pepin:
Algebraically Structured LWE, Revisited. 1-23 - Alex Lombardi, Vinod Vaikuntanathan, Thuy-Duong Vuong:
Lattice Trapdoors and IBE from Middle-Product LWE. 24-54 - Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee:
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation. 55-80 - Steven D. Galbraith, Lukas Zobernig:
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems. 81-110 - Daniele Friolo, Daniel Masny, Daniele Venturi:
A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement. 111-130 - Erica Blum, Jonathan Katz, Julian Loss:
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees. 131-150 - Josh Alman, Robin Hui:
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank. 151-173 - Prabhanjan Ananth, Vinod Vaikuntanathan:
Optimal Bounded-Collusion Secure Functional Encryption. 174-198 - Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
From FE Combiners to Secure MPC and Back. 199-228 - Zvika Brakerski, Omri Shmueli:
(Pseudo) Random Quantum States with Binary Phase. 229-250 - Zhengfeng Ji, Youming Qiao, Fang Song, Aaram Yun:
General Linear Group Action on Tensors: A Candidate for Post-quantum Cryptography. 251-281 - Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu:
Composable and Finite Computational Security of Quantum Message Transmission. 282-311 - Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin:
On Fully Secure MPC with Solitary Output. 312-340 - Elette Boyle, Niv Gilboa, Yuval Ishai:
Secure Computation with Preprocessing via Function Secret Sharing. 341-371 - Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Private PEZ Protocols for Symmetric Functions. 372-392 - Henry Corrigan-Gibbs, Dmitry Kogan:
The Function-Inversion Problem: Barriers and Opportunities. 393-421 - Nir Bitansky, Akshay Degwekar:
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations. 422-450 - Ian McQuoid, Trevor Swope, Mike Rosulek:
Characterizing Collision and Second-Preimage Resistance in Linicrypt. 451-470 - Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Chen Yuan:
Efficient Information-Theoretic Secure Multiparty Computation over Z/pkZ via Galois Rings. 471-501 - Marshall Ball, Elette Boyle, Ran Cohen, Tal Malkin, Tal Moran:
Is Information-Theoretic Topology-Hiding Computation Possible? 502-530 - Iftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak:
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation. 531-560 - Bar Alon, Anat Paskin-Cherniavsky:
On Perfectly Secure 2PC in the OT-Hybrid Model. 561-595
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.