Advances in Cryptology – EUROCRYPT 2011

30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings

  • Kenneth G. Paterson
Conference proceedings EUROCRYPT 2011

DOI: 10.1007/978-3-642-20465-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6632)

Table of contents (33 papers)

  1. Front Matter
  2. Invited Talks

  3. Lattice-Based Cryptography

    1. Efficient Authentication from Hard Learning Problems
      Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi
      Pages 7-26
  4. Implementation and Side Channels

    1. Faster Explicit Formulas for Computing Pairings over Ordinary Curves
      Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López
      Pages 48-68
    2. Pushing the Limits: A Very Compact and a Threshold Implementation of AES
      Amir Moradi, Axel Poschmann, San Ling, Christof Paar, Huaxiong Wang
      Pages 69-88
    3. Fully Leakage-Resilient Signatures
      Elette Boyle, Gil Segev, Daniel Wichs
      Pages 89-108
    4. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
      Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Dina Kamel, Denis Flandre
      Pages 109-128
  5. Homomorphic Cryptography

    1. Implementing Gentry’s Fully-Homomorphic Encryption Scheme
      Craig Gentry, Shai Halevi
      Pages 129-148
    2. Homomorphic Signatures for Polynomial Functions
      Dan Boneh, David Mandell Freeman
      Pages 149-168
    3. Semi-homomorphic Encryption and Multiparty Computation
      Rikke Bendlin, Ivan Damgård, Claudio Orlandi, Sarah Zakarias
      Pages 169-188
  6. Signature Schemes

    1. Adaptive Pseudo-free Groups and Applications
      Dario Catalano, Dario Fiore, Bogdan Warinschi
      Pages 207-223
    2. Commuting Signatures and Verifiable Encryption
      Georg Fuchsbauer
      Pages 224-245
  7. Information-Theoretic Cryptography

    1. Secret Keys from Channel Noise
      Hadi Ahmadi, Reihaneh Safavi-Naini
      Pages 266-283
  8. Symmetric Key Cryptography

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011.
The 31 papers, presented together with 2 invited talks, were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on lattice-base cryptography, implementation and side channels, homomorphic cryptography, signature schemes, information-theoretic cryptography, symmetric key cryptography, attacks and algorithms, secure computation, composability, key dependent message security, and public key encryption.

Keywords

authentication cryptanalysis cryptography multi-party computation oblivious transfer

Editors and affiliations

  • Kenneth G. Paterson
    • 1
  1. 1.Information Security Group (ISG)University of LondonEghamUK

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-20464-7
  • Online ISBN 978-3-642-20465-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349