Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15--17, 2009. Proceedings
From MaRDI portal
Publication:1002363
DOI10.1007/978-3-642-00457-5zbMath1156.94005OpenAlexW26407618MaRDI QIDQ1002363
No author found.
Publication date: 26 February 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00457-5
Proceedings of conferences of miscellaneous specific interest (00B25) Cryptography (94A60) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Related Items (6)
Dual trapdoor identity-based encryption with keyword search ⋮ Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity ⋮ High-performance multi-party computation for binary circuits based on oblivious transfer ⋮ On the One-Way Function Candidate Proposed by Goldreich ⋮ On Complete Primitives for Fairness ⋮ Leakage-resilient key exchange and two-seed extractors
This page was built for publication: Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15--17, 2009. Proceedings