Advances in Cryptology – CRYPTO 2010

30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings

  • Tal Rabin
Conference proceedings CRYPTO 2010

DOI: 10.1007/978-3-642-14623-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6223)

Table of contents (39 papers)

  1. Front Matter
  2. Leakage

  3. Lattice

  4. Homomorphic Encryption

    1. Additively Homomorphic Encryption with d-Operand Multiplications
      Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
      Pages 138-154
    2. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
      Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
      Pages 155-172
  5. Theory and Applications

    1. Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
      Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
      Pages 173-190
    2. Structure-Preserving Signatures and Commitments to Group Elements
      Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo
      Pages 209-236
    3. Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
      Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
      Pages 237-254
  6. Key Exchange, OAEP/RSA, CCA

    1. Credential Authenticated Identification and Key Exchange
      Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
      Pages 255-276
    2. Password-Authenticated Session-Key Generation on the Internet in the Plain Model
      Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
      Pages 277-294
    3. Instantiability of RSA-OAEP under Chosen-Plaintext Attack
      Eike Kiltz, Adam O’Neill, Adam Smith
      Pages 295-313
  7. Attacks

    1. Factorization of a 768-Bit RSA Modulus
      Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos et al.
      Pages 333-350
    2. Correcting Errors in RSA Private Keys
      Wilko Henecka, Alexander May, Alexander Meurer
      Pages 351-369

About these proceedings

Keywords

AES Hashing Internet Permutation algebraic geometry authentication block ciphers collision resistance complexity cryptography embedded systems security trust

Editors and affiliations

  • Tal Rabin
    • 1
  1. 1.IBM T.J.Watson Research CenterHawthorneUSA

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-14622-0
  • Online ISBN 978-3-642-14623-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349