Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4--7, 2006. Proceedings.
DOI10.1007/11681878zbMATH Open1097.94002OpenAlexW3149533473MaRDI QIDQ2507992FDOQ2507992
Authors:
Publication date: 6 October 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11681878
Recommendations
- Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19--21, 2008. Proceedings
- Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15--17, 2009. Proceedings
- Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3--6, 2013. Proceedings
- Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10--12, 2005. Proceedings.
- Theory of cryptography. First theory of cryptography conference, TCC 2004, Cambridge, MA, USA, February 19--21, 2004. Proceedings.
- Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16--19, 2020. Proceedings. Part III
- Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28--30, 2011. Proceedings
- Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21--24, 2007. Proceedings.
- Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10--13, 2016. Proceedings. Part I
- Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10--13, 2016. Proceedings. Part II
Cryptography (94A60) Proceedings of conferences of miscellaneous specific interest (00B25) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Cited In (4)
- Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3--6, 2013. Proceedings
- Reconciling non-malleability with homomorphic encryption
- Static-memory-hard functions, and modeling the cost of space vs. time
- A lower bound on the key length of information-theoretic forward-secure storage schemes
This page was built for publication: Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4--7, 2006. Proceedings.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2507992)