Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10--12, 2005. Proceedings.
From MaRDI portal
Publication:2388712
DOI10.1007/b106171zbMath1069.94500OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ2388712
No author found.
Publication date: 20 September 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b106171
Proceedings of conferences of miscellaneous specific interest (00B25) Cryptography (94A60) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Related Items (5)
How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\) ⋮ Improved Cryptographic Puzzle Based on Modular Exponentiation ⋮ Reconciling non-malleability with homomorphic encryption ⋮ New Communication-Efficient Oblivious Transfer Protocols Based on Pairings ⋮ On Basing Private Information Retrieval on NP-Hardness
This page was built for publication: Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10--12, 2005. Proceedings.