Security and Cryptology

Theory of Cryptography

Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings

Editors: Kilian, Joe (Ed.)

Buy this book

eBook $129.00
price for USA (gross)
  • ISBN 978-3-540-30576-7
  • Digitally watermarked, DRM-free
  • Included format:
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $169.00
price for USA
  • ISBN 978-3-540-24573-5
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

TCC 2005, the 2nd Annual Theory of Cryptography Conference, was held in Cambridge,Massachusetts,onFebruary10–12,2005.Theconferencereceived84 submissions,ofwhichtheprogramcommitteeselected32forpresentation.These proceedings contain the revised versions of the submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also included a panel discussion on the future of theoretical cryptography and its relationship to the real world (whatever that is). It also included the traditional “rump session,” featuring short, informal talks on late-breaking research news. Much as hatters of old faced mercury-induced neurological damage as an occupational hazard, computer scientists will on rare occasion be a?icted with egocentrism, probably due to prolonged CRT exposure. Thus, you must view withpityandnotcontemptmyunalloyedelationathavingmynameonthefront cover of this LNCS volume, and my deep-seated conviction that I fully deserve the fame and riches that will surely come of it. However, having in recent years switched over to an LCD monitor, I would like to acknowledge some of the many who contributed to this conference. First thanks are due to the many researchers from all over the world who submitted their work to this conference. Lacking shrimp and chocolate-covered strawberries, TCC has to work hard to be a good conference. As a community, I think we have.

Table of contents (32 chapters)

  • Optimal Error Correction Against Computationally Bounded Noise

    Micali, Silvio (et al.)

    Pages 1-16

  • Hardness Amplification of Weakly Verifiable Puzzles

    Canetti, Ran (et al.)

    Pages 17-33

  • On Hardness Amplification of One-Way Functions

    Lin, Henry (et al.)

    Pages 34-49

  • Cryptography in Subgroups of $\mathbb{Z}_{n}^{*}$

    Groth, Jens

    Pages 50-65

  • Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs

    Naor, Moni (et al.)

    Pages 66-85

Buy this book

eBook $129.00
price for USA (gross)
  • ISBN 978-3-540-30576-7
  • Digitally watermarked, DRM-free
  • Included format:
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $169.00
price for USA
  • ISBN 978-3-540-24573-5
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Theory of Cryptography
Book Subtitle
Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings
Editors
  • Joe Kilian
Series Title
Security and Cryptology
Series Volume
3378
Copyright
2005
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-30576-7
DOI
10.1007/b106171
Softcover ISBN
978-3-540-24573-5
Edition Number
1
Number of Pages
XII, 628
Topics