Skip to main content

Theory of Cryptography

Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings

  • Conference proceedings
  • © 2006

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3876)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: TCC 2006.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (32 papers)

  1. Zero-Knowledge

  2. Primitives

  3. Assumptions and Models

  4. The Bounded-Retrieval Model

  5. Privacy

  6. Secret Sharing and Multi-party Computation (I)

  7. Universally-Composible Security

Other volumes

  1. Theory of Cryptography

Keywords

Editors and Affiliations

  • IBM Research, Hawthorne, USA

    Shai Halevi

  • IBM T.J.Watson Research Center, Hawthorne, USA

    Tal Rabin

Bibliographic Information

Publish with us