Table of contents for issues of Lecture Notes in Computer Science

Last update: Tue Nov 6 17:10:34 MST 2018                Valid HTML 3.2!

Volume 8349, 2014
Volume 8781, November 29, 2014


Lecture Notes in Computer Science
Volume 8349, 2014

            Zvika Brakerski and   
                Guy N. Rothblum   Virtual Black-Box Obfuscation for All
                                  Circuits via Generic Graded Encoding . . 1--25
                 Boaz Barak and   
               Nir Bitansky and   
                Ran Canetti and   
          Yael Tauman Kalai and   
                Omer Paneth and   
                     Amit Sahai   Obfuscation for Evasive Functions  . . . 26--51
               Elette Boyle and   
              Kai-Min Chung and   
                    Rafael Pass   On Extractability Obfuscation  . . . . . 52--73
                Sanjam Garg and   
               Craig Gentry and   
                Shai Halevi and   
                Mariana Raykova   Two-Round Secure MPC from
                                  Indistinguishability Obfuscation . . . . 74--94
           Takahiro Matsuda and   
               Goichiro Hanaoka   Chosen Ciphertext Security via Point
                                  Obfuscation  . . . . . . . . . . . . . . 95--120
                Yuval Ishai and   
                      Mor Weiss   Probabilistically Checkable Proofs of
                                  Proximity with Zero-Knowledge  . . . . . 121--145
                  Omkant Pandey   Achieving Constant Round
                                  Leakage-Resilient Zero-Knowledge . . . . 146--166
            Claudio Orlandi and   
           Rafail Ostrovsky and   
              Vanishree Rao and   
                 Amit Sahai and   
                  Ivan Visconti   Statistical Concurrent Non-malleable
                                  Zero Knowledge . . . . . . . . . . . . . 167--191
              Kai-Min Chung and   
           Rafail Ostrovsky and   
                Rafael Pass and   
Muthuramakrishnan Venkitasubramaniam \textellipsis   $4$-Round Resettably-Sound Zero
                                  Knowledge  . . . . . . . . . . . . . . . 192--216
         Dana Dachman-Soled and   
          Mohammad Mahmoody and   
                     Tal Malkin   Can Optimally-Fair Coin Tossing Be Based
                                  on One-Way Functions?  . . . . . . . . . 217--239
          Mohammad Mahmoody and   
            Hemanta K. Maji and   
              Manoj Prabhakaran   On the Power of Public-Key Encryption in
                                  Secure Computation . . . . . . . . . . . 240--264
               Takahiro Matsuda   On the Impossibility of Basing
                                  Public-Coin One-Way Permutations on
                                  Trapdoor Permutations  . . . . . . . . . 265--290
                  Gilad Asharov   Towards Characterizing Complete Fairness
                                  in Secure Two-Party Computation  . . . . 291--316
                Amos Beimel and   
                Yuval Ishai and   
           Ranjit Kumaresan and   
               Eyal Kushilevitz   On the Cryptographic Complexity of the
                                  Worst Functions  . . . . . . . . . . . . 317--342
           Susumu Kiyoshima and   
           Yoshifumi Manabe and   
               Tatsuaki Okamoto   Constant-Round Black-Box Construction of
                                  Composable Multi-Party Computation
                                  Protocol . . . . . . . . . . . . . . . . 343--367
               Carmit Hazay and   
                   Arpita Patra   One-Sided Adaptively Secure Two-Party
                                  Computation  . . . . . . . . . . . . . . 368--393
                Amos Beimel and   
            Aner Ben-Efraim and   
        Carles Padró and   
                   Ilya Tyomkin   Multi-linear Secret-Sharing Schemes  . . 394--418
                Martin Hirt and   
                Ueli Maurer and   
                   Pavel Raykov   Broadcast Amplification  . . . . . . . . 419--439
           Mahdi Cheraghchi and   
           Venkatesan Guruswami   Non-malleable Coding against Bit-Wise
                                  and Split-State Tampering  . . . . . . . 440--464
            Sebastian Faust and   
          Pratyay Mukherjee and   
        Jesper Buus Nielsen and   
                Daniele Venturi   Continuous Non-malleable Codes . . . . . 465--488


Lecture Notes in Computer Science
Volume 8781, November 29, 2014

             Ange Albertini and   
     Jean-Philippe Aumasson and   
           Maria Eichlseder and   
             Florian Mendel and   
          Martin Schläffer   Malicious Hashing: Eve's Variant of
                                  SHA-1  . . . . . . . . . . . . . . . . . 1--19