zbMATH — the first resource for mathematics

Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. (English) Zbl 1188.94008
Lecture Notes in Computer Science 6110. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). xiv, 694 p. (2010).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1161.94003).
Indexed articles:
Lyubashevsky, Vadim; Peikert, Chris; Regev, Oded, On ideal lattices and learning with errors over rings, 1-23 [Zbl 1279.94099]
van Dijk, Marten; Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod, Fully homomorphic encryption over the integers, 24-43 [Zbl 1279.94130]
Freeman, David Mandell, Converting pairing-based cryptosystems from composite-order groups to prime-order groups, 44-61 [Zbl 1279.94074]
Lewko, Allison; Okamoto, Tatsuaki; Sahai, Amit; Takashima, Katsuyuki; Waters, Brent, Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption, 62-91 [Zbl 1279.94095]
Hada, Satoshi, Secure obfuscation for encrypted signatures, 92-112 [Zbl 1279.94083]
Alwen, Joël; Dodis, Yevgeniy; Naor, Moni; Segev, Gil; Walfish, Shabsi; Wichs, Daniel, Public-key encryption in the bounded-retrieval model, 113-134 [Zbl 1279.94051]
Faust, Sebastian; Rabin, Tal; Reyzin, Leonid; Tromer, Eran; Vaikuntanathan, Vinod, Protecting circuits from leakage: the computationally-bounded and noisy cases, 135-156 [Zbl 1279.94073]
Gordon, S. Dov; Katz, Jonathan, Partial fairness in secure two-party computation, 157-176 [Zbl 1279.94078]
Garay, Juan; Givens, Clint; Ostrovsky, Rafail, Secure message transmission with small public discussion, 177-196 [Zbl 1280.94057]
Fischlin, Marc; Schröder, Dominique, On the impossibility of three-move blind signature schemes, 197-215 [Zbl 1280.94054]
Hänggi, Esther; Renner, Renato; Wolf, Stefan, Efficient device-independent quantum key distribution, 216-234 [Zbl 1280.94066]
Howgrave-Graham, Nick; Joux, Antoine, New generic algorithms for hard knapsacks, 235-256 [Zbl 1280.94069]
Gama, Nicolas; Nguyen, Phong Q.; Regev, Oded, Lattice enumeration using extreme pruning, 257-278 [Zbl 1280.94056]
Faugère, Jean-Charles; Otmani, Ayoub; Perret, Ludovic; Tillich, Jean-Pierre, Algebraic cryptanalysis of McEliece variants with compact keys, 279-298 [Zbl 1280.94051]
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi, Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds, 299-319 [Zbl 1280.94040]
Yung, Moti, Cryptography between wonderland and underland, 320-321 [Zbl 1280.94100]
Biryukov, Alex; Nikolić, Ivica, Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others, 322-344 [Zbl 1280.94041]
Paterson, Kenneth G.; Watson, Gaven J., Plaintext-dependent decryption: a formal security treatment of SSH-CTR, 345-361 [Zbl 1280.94090]
Micciancio, Daniele, Computational soundness, co-induction, and encryption cycles, 362-380 [Zbl 1280.94084]
Fehr, Serge; Hofheinz, Dennis; Kiltz, Eike; Wee, Hoeteck, Encryption schemes secure against chosen-ciphertext selective opening attacks, 381-402 [Zbl 1280.94052]
Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David, Cryptographic agility and its relation to circular encryption, 403-422 [Zbl 1280.94034]
Barak, Boaz; Haitner, Iftach; Hofheinz, Dennis; Ishai, Yuval, Bounded key-dependent message security, 423-444 [Zbl 1280.94038]
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel, Perfectly secure multiparty computation and the computational overhead of cryptography, 445-465 [Zbl 1280.94046]
Hirt, Martin; Zikas, Vassilis, Adaptively secure broadcast, 466-485 [Zbl 1280.94067]
Unruh, Dominique, Universally composable quantum multi-party computation, 486-505 [Zbl 1280.94096]
Gentry, Craig; Halevi, Shai; Vaikuntanathan, Vinod, A simple BGN-type cryptosystem from LWE, 506-522 [Zbl 1280.94060]
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris, Bonsai trees, or how to delegate a lattice basis, 523-552 [Zbl 1280.94043]
Agrawal, Shweta; Boneh, Dan; Boyen, Xavier, Efficient lattice (H)IBE in the standard model, 553-572 [Zbl 1227.94022]
Lee, Jooyoung; Steinberger, John, Multi-property-preserving domain extension using polynomial-based modes of operation, 573-596 [Zbl 1280.94078]
Steinberger, John, Stam’s collision resistance conjecture, 597-615 [Zbl 1280.94094]
Haitner, Iftach; Holenstein, Thomas; Reingold, Omer; Vadhan, Salil; Wee, Hoeteck, Universal one-way hash functions via inaccessible entropy, 616-637 [Zbl 1280.94065]
Pass, Rafael; Wee, Hoeteck, Constant-round non-malleable commitments from sub-exponential one-way functions, 638-655 [Zbl 1280.94089]
Hohenberger, Susan; Waters, Brent, Constructing verifiable random functions with large input spaces, 656-672 [Zbl 1280.94068]
Kiltz, Eike; Mohassel, Payman; O’Neill, Adam, Adaptive trapdoor functions and chosen-ciphertext security, 673-692 [Zbl 1280.94076]

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI