Cargando…

Advances in Cryptology - EUROCRYPT 2010 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010, Proceedings /

These are the proceedings of Eurocrypt 2010, the 29th in the series of Eu- pean conferences on the Theory and Application of Cryptographic Techniques. The conference was sponsored by the International Association for Cryptologic Research and held on the French Riviera, May 30-June 3, 2010. A total o...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Gilbert, Henri (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6110
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Cryptosystems I
  • On Ideal Lattices and Learning with Errors over Rings
  • Fully Homomorphic Encryption over the Integers
  • Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
  • Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
  • Obfuscation and Side Channel Security
  • Secure Obfuscation for Encrypted Signatures
  • Public-Key Encryption in the Bounded-Retrieval Model
  • Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
  • 2-Party Protocols
  • Partial Fairness in Secure Two-Party Computation
  • Secure Message Transmission with Small Public Discussion
  • On the Impossibility of Three-Move Blind Signature Schemes
  • Efficient Device-Independent Quantum Key Distribution
  • Cryptanalysis
  • New Generic Algorithms for Hard Knapsacks
  • Lattice Enumeration Using Extreme Pruning
  • Algebraic Cryptanalysis of McEliece Variants with Compact Keys
  • Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
  • IACR Distinguished Lecture
  • Cryptography between Wonderland and Underland
  • Automated Tools and Formal Methods
  • Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
  • Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
  • Computational Soundness, Co-induction, and Encryption Cycles
  • Models and Proofs
  • Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
  • Cryptographic Agility and Its Relation to Circular Encryption
  • Bounded Key-Dependent Message Security
  • Multiparty Protocols
  • Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
  • Adaptively Secure Broadcast
  • Universally Composable Quantum Multi-party Computation
  • Cryptosystems II
  • A Simple BGN-Type Cryptosystem from LWE
  • Bonsai Trees, or How to Delegate a Lattice Basis
  • Efficient Lattice (H)IBE in the Standard Model
  • Hash and MAC
  • Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation
  • Stam's Collision Resistance Conjecture
  • Universal One-Way Hash Functions via Inaccessible Entropy
  • Foundational Primitives
  • Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions
  • Constructing Verifiable Random Functions with Large Input Spaces
  • Adaptive Trapdoor Functions and Chosen-Ciphertext Security.