Table of Contents for: Advances in cryptology--EUROCRYPT 2010 :

 Staff view

You must be logged in to Tag Records

Advances in cryptology--EUROCRYPT 2010 [electronic resource] : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings /

Henri Gilbert (ed.).

Book Cover
Names: Gilbert, Henri.
Published: Berlin : Springer, 2010.
Series: Lecture notes in computer science ; 6110.
LNCS sublibrary. SL 4 Security and cryptology.
Topics: Computers - Access control - Congresses. | Cryptography - Congresses. | Data transmission systems - Security measures - Congresses.
Genres: Electronic books.
Online Access: SpringerLink Link to Advances in cryptology--EUROCRYPT 2010 (access limited to Benedictine University patrons)
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


Cryptosystems I. On ideal lattices and learning with errors over rings / Vadim Lyubashevsky, Chris Peikert, and Oded Regev -- Fully homomorphic encryption over the integers / Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan -- Converting pairing-based cryptosystems from composite-order groups to prime-order groups / David Mandell Freeman -- Fully secure functional encryption : attribute-based encryption and (hierarchical) inner product encryption / Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters -- Obfuscation and side channel security. Secure obfuscation for encrypted signatures / Satoshi Hada -- Public-key encryption in the bounded-retrieval model / Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, and Daniel Wichs -- Protecting circuits from leakage : the computationally-bounded and noisy cases / Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, and Vinod Vaikuntanathan -- 2-party protocols. Partial fairness in secure two-party computation / S. Dov Gordon and Jonathan Katz -- Secure message transmission with small public discussion / Juan Garay, Clint Givens, and Rafail Ostrovsky -- On the impossibility of three-move blind signature schemes / Marc Fischlin and Dominique Schröder -- Efficient device-independent quantum key distribution / Esther Hänggi, Renato Renner, and Stefan Wolf -- Cryptanalysis. New generic algorithms for hard knapsacks / Nick Howgrave-Graham and Antoine Joux -- Lattice enumeration using extreme pruning / Nicolas Gama, Phong Q. Nguyen, and Oded Regev -- Algebraic cryptanalysis of McEliece variants with compact keys / Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, and Jean-Pierre Tillich -- Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds / Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir -- 2010 IACR distinguished lecture. Cryptography between wonderland and underland / Moti Yung -- Automated tools and formal methods. Automatic search for related-key differential characteristics in byte-oriented block ciphers : application to AES, Camellia, Khazad and others / Alex Biryukov and Ivica Nikolić -- Plaintext-dependent decryption : a formal security treatment of SSH-CTR / Kenneth G. Paterson and Gaven J. Watson -- Computational soundness, co-induction, and encryption cycles / Daniele Micciancio -- Models and proofs. Encryption schemes secure against chosen-ciphertext selective opening attacks / Serge Fehr, Dennis Hofheinz, Eike Kiltz, and Hoeteck Wee -- Cryptographic agility and its relation to circular encryption / Tolga Acar, Mira Belenkiy, Mihir Bellare, and David Cash -- Bounded key-dependent message security / Boaz Barak, Iftach Haitner, Dennis Hofheinz, and Yuval Ishai -- Multiparty protocols. Perfectly secure multiparty computation and the computational overhead of cryptography / Ivan Damgård, Yuval Ishai, and Mikkel Krøigaard -- Adaptively secure broadcast / Martin Hirt and Vassilis Zikas -- Universally composable quantum multi-party computation / Dominique Unruh -- Cryptosystems II. A simple BGN-type cryptosystem from LWE / Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan -- Bonsai trees, or how to delegate a lattice basis / David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert -- Efficient lattice (H)IBE in the standard model / Shweta Agrawal, Dan Boneh, and Xavier Boyen -- Hash and MAC. Multi-property-preserving domain extension using polynomial-based modes of operation / Jooyoung Lee and John Steinberger -- Stam's collision resistance conjecture / John Steinberger -- Universal one-way hash functions via inaccessible entropy / Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, and Hoeteck Wee -- Foundational primitives. Constant-round non-malleable commitments from sub-exponential one-way functions / Rafael Pass and Hoeteck Wee -- Constructing verifiable random functions with large input spaces / Susan Hohenberger and Brent Waters -- Adaptive trapdoor functions and chosen-ciphertext security / Eike Kiltz, Payman Mohassel, and Adam O'Neill.

Table of Contents for: Advances in cryptology--EUROCRYPT 2010 :