Ten talks I heard at TCC'10
These notes
refer to ten of the talks that I heard at the last TCC
(see the conference's proceedings published as LNCS 5978).
While one may definitely infer from the fact that a certain work
is reviewed in these notes that I liked it, the converse may not
be true. That is, the fact that some works are not reviewed here
does not mean that I did not like them, since there may be
other reasons for such omissions (e.g., failing to attend the
talk, failing to understand it sufficiently well, etc.)

Parallel Repetition Theorems for Interactive Arguments
By: KaiMin Chung and FengHao Liu

On Symmetric Encryption and Point Obfuscation
By: Ran Canetti, Yael Tauman Kalai, Mayank Varia, and Daniel Wichs

From Passive to Covert Security at Low Cost
By: Ivan Damgard, Martin Geisler, and Jesper Buus Nielsen

A Hardcore Lemma for Computational Indistinguishability:
Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch
By: Ueli Maurer and Stefano Tessaro

DelayedKey Message Authentication for Streams
By: Marc Fischlin and Anja Lehmann

Founding Cryptography on TamperProof Hardware Tokens
By: Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan,
and Akshay Wadia

PublicKey Cryptographic Primitives Provably as Secure as Subset Sum
By: Vadim Lyubashevsky, Adriana Palacio, and Gil Segev

Bounds on the Sample Complexity for Private Learning and Private Data Release
By: Amos Beimel, Shiva Kasiviswanathan, and Kobbi Nissim

Secure Computation and Its Diverse Applications (survey)
By: Yuval Ishai

Eye for an Eye: Efficient Concurrent ZeroKnowledge in the Timing Model
By: Rafael Pass, WeiLung Dustin Tseng,
and Muthuramakrishnan Venkitasubramaniam
Back to
list of Oded's choices.