The Resource Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings, Joe Kilian (ed.)
Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings, Joe Kilian (ed.)
Resource Information
The item Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings, Joe Kilian (ed.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings, Joe Kilian (ed.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- TCC 2005, the 2nd Annual Theory of Cryptography Conference, was held in Cambridge, Massachusetts, onFebruary10-12,2005. Theconferencereceived84 submissions, ofwhichtheprogramcommitteeselected32forpresentation. These proceedings contain the revised versions of the submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also included a panel discussion on the future of theoretical cryptography and its relationship to the real world (whatever that is). It also included the traditional?rump session,? featuring short, informal talks on late-breaking research news. Much as hatters of old faced mercury-induced neurological damage as an occupational hazard, computer scientists will on rare occasion be a?icted with egocentrism, probably due to prolonged CRT exposure. Thus, you must view withpityandnotcontemptmyunalloyedelationathavingmynameonthefront cover of this LNCS volume, and my deep-seated conviction that I fully deserve the fame and riches that will surely come of it. However, having in recent years switched over to an LCD monitor, I would like to acknowledge some of the many who contributed to this conference. First thanks are due to the many researchers from all over the world who submitted their work to this conference. Lacking shrimp and chocolate-covered strawberries, TCC has to work hard to be a good conference. As a community, I think we have
- Language
- eng
- Extent
- 1 online resource (xii, 619 pages)
- Contents
-
- Hardness Amplification and Error Correction
- Optimal Error Correction Against Computationally Bounded Noise
- Hardness Amplification of Weakly Verifiable Puzzles
- On Hardness Amplification of One-Way Functions
- Graphs and Groups
- Cryptography in Subgroups of
- Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs
- Simulation and Secure Computation
- Comparing Two Notions of Simulatability
- Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
- Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
- Security of Encryption
- Adaptively-Secure, Non-interactive Public-Key Encryption
- Adaptive Security of Symbolic Encryption
- Chosen-Ciphertext Security of Multiple Encryption
- Steganography and Zero Knowledge
- Public-Key Steganography with Active Attacks
- Upper and Lower Bounds on Black-Box Steganography
- Fair-Zero Knowledge
- Secure Computation I
- How to Securely Outsource Cryptographic Computations
- Secure Computation of the Mean and Related Statistics
- Keyword Search and Oblivious Pseudorandom Functions
- Secure Computation II
- Evaluating 2-DNF Formulas on Ciphertexts
- Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation
- Toward Privacy in Public Databases
- Quantum Cryptography and Universal Composability
- The Universal Composable Security of Quantum Key Distribution
- Universally Composable Privacy Amplification Against Quantum Adversaries
- A Universally Composable Secure Channel Based on the KEM-DEM Framework
- Cryptographic Primitives and Security
- Sufficient Conditions for Collision-Resistant Hashing
- The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
- On the Relationships Between Notions of Simulation-Based Security
- Encryption and Signatures
- A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes
- Further Simplifications in Proactive RSA Signatures
- Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem
- Information Theoretic Cryptography
- Entropic Security and the Encryption of High Entropy Messages
- Error Correction in the Bounded Storage Model
- Characterizing Ideal Weighted Threshold Secret Sharing
- Isbn
- 9783540245735
- Label
- Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings
- Title
- Theory of cryptography
- Title remainder
- Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings
- Statement of responsibility
- Joe Kilian (ed.)
- Title variation
-
- Second Theory of Cryptography Conference
- Theory of Cryptography Conference
- TCC 2005
- Subject
-
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computer security
- Computer security -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Cryptographie (Informatique)
- Cryptography
- Cryptography
- Cryptography
- Cryptography -- Congresses
- Informatique
- Sécurité informatique
- COMPUTERS -- Internet | Security
- Language
- eng
- Summary
- TCC 2005, the 2nd Annual Theory of Cryptography Conference, was held in Cambridge, Massachusetts, onFebruary10-12,2005. Theconferencereceived84 submissions, ofwhichtheprogramcommitteeselected32forpresentation. These proceedings contain the revised versions of the submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also included a panel discussion on the future of theoretical cryptography and its relationship to the real world (whatever that is). It also included the traditional?rump session,? featuring short, informal talks on late-breaking research news. Much as hatters of old faced mercury-induced neurological damage as an occupational hazard, computer scientists will on rare occasion be a?icted with egocentrism, probably due to prolonged CRT exposure. Thus, you must view withpityandnotcontemptmyunalloyedelationathavingmynameonthefront cover of this LNCS volume, and my deep-seated conviction that I fully deserve the fame and riches that will surely come of it. However, having in recent years switched over to an LCD monitor, I would like to acknowledge some of the many who contributed to this conference. First thanks are due to the many researchers from all over the world who submitted their work to this conference. Lacking shrimp and chocolate-covered strawberries, TCC has to work hard to be a good conference. As a community, I think we have
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- T473 2005
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2005
- http://bibfra.me/vocab/lite/meetingName
- Theory of Cryptography Conference
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Kilian, Joe
- Series statement
- Lecture notes in computer science,
- Series volume
- 3378
- http://library.link/vocab/subjectName
-
- Computer security
- Cryptography
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Computer security
- Cryptography
- Informatique
- Computer security
- Cryptography
- Cryptographie (Informatique)
- Sécurité informatique
- Label
- Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings, Joe Kilian (ed.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Hardness Amplification and Error Correction -- Optimal Error Correction Against Computationally Bounded Noise -- Hardness Amplification of Weakly Verifiable Puzzles -- On Hardness Amplification of One-Way Functions -- Graphs and Groups -- Cryptography in Subgroups of -- Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs -- Simulation and Secure Computation -- Comparing Two Notions of Simulatability -- Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation -- Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs -- Security of Encryption -- Adaptively-Secure, Non-interactive Public-Key Encryption -- Adaptive Security of Symbolic Encryption -- Chosen-Ciphertext Security of Multiple Encryption -- Steganography and Zero Knowledge -- Public-Key Steganography with Active Attacks -- Upper and Lower Bounds on Black-Box Steganography -- Fair-Zero Knowledge -- Secure Computation I -- How to Securely Outsource Cryptographic Computations -- Secure Computation of the Mean and Related Statistics -- Keyword Search and Oblivious Pseudorandom Functions -- Secure Computation II -- Evaluating 2-DNF Formulas on Ciphertexts -- Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation -- Toward Privacy in Public Databases -- Quantum Cryptography and Universal Composability -- The Universal Composable Security of Quantum Key Distribution -- Universally Composable Privacy Amplification Against Quantum Adversaries -- A Universally Composable Secure Channel Based on the KEM-DEM Framework -- Cryptographic Primitives and Security -- Sufficient Conditions for Collision-Resistant Hashing -- The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives -- On the Relationships Between Notions of Simulation-Based Security -- Encryption and Signatures -- A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes -- Further Simplifications in Proactive RSA Signatures -- Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem -- Information Theoretic Cryptography -- Entropic Security and the Encryption of High Entropy Messages -- Error Correction in the Bounded Storage Model -- Characterizing Ideal Weighted Threshold Secret Sharing
- Control code
- 262680723
- Dimensions
- unknown
- Extent
- 1 online resource (xii, 619 pages)
- Form of item
- online
- Isbn
- 9783540245735
- Lccn
- 2005920136
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 9783540245735
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-24573-5
- Specific material designation
- remote
- System control number
- (OCoLC)262680723
- Label
- Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings, Joe Kilian (ed.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Hardness Amplification and Error Correction -- Optimal Error Correction Against Computationally Bounded Noise -- Hardness Amplification of Weakly Verifiable Puzzles -- On Hardness Amplification of One-Way Functions -- Graphs and Groups -- Cryptography in Subgroups of -- Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs -- Simulation and Secure Computation -- Comparing Two Notions of Simulatability -- Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation -- Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs -- Security of Encryption -- Adaptively-Secure, Non-interactive Public-Key Encryption -- Adaptive Security of Symbolic Encryption -- Chosen-Ciphertext Security of Multiple Encryption -- Steganography and Zero Knowledge -- Public-Key Steganography with Active Attacks -- Upper and Lower Bounds on Black-Box Steganography -- Fair-Zero Knowledge -- Secure Computation I -- How to Securely Outsource Cryptographic Computations -- Secure Computation of the Mean and Related Statistics -- Keyword Search and Oblivious Pseudorandom Functions -- Secure Computation II -- Evaluating 2-DNF Formulas on Ciphertexts -- Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation -- Toward Privacy in Public Databases -- Quantum Cryptography and Universal Composability -- The Universal Composable Security of Quantum Key Distribution -- Universally Composable Privacy Amplification Against Quantum Adversaries -- A Universally Composable Secure Channel Based on the KEM-DEM Framework -- Cryptographic Primitives and Security -- Sufficient Conditions for Collision-Resistant Hashing -- The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives -- On the Relationships Between Notions of Simulation-Based Security -- Encryption and Signatures -- A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes -- Further Simplifications in Proactive RSA Signatures -- Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem -- Information Theoretic Cryptography -- Entropic Security and the Encryption of High Entropy Messages -- Error Correction in the Bounded Storage Model -- Characterizing Ideal Weighted Threshold Secret Sharing
- Control code
- 262680723
- Dimensions
- unknown
- Extent
- 1 online resource (xii, 619 pages)
- Form of item
- online
- Isbn
- 9783540245735
- Lccn
- 2005920136
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 9783540245735
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-24573-5
- Specific material designation
- remote
- System control number
- (OCoLC)262680723
Subject
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computer security
- Computer security -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Cryptographie (Informatique)
- Cryptography
- Cryptography
- Cryptography
- Cryptography -- Congresses
- Informatique
- Sécurité informatique
- COMPUTERS -- Internet | Security
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Theory-of-cryptography--Second-Theory-of/jWmi9rtC40c/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Theory-of-cryptography--Second-Theory-of/jWmi9rtC40c/">Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings, Joe Kilian (ed.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings, Joe Kilian (ed.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Theory-of-cryptography--Second-Theory-of/jWmi9rtC40c/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Theory-of-cryptography--Second-Theory-of/jWmi9rtC40c/">Theory of cryptography : Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005 : proceedings, Joe Kilian (ed.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>