Advances in Cryptology – EUROCRYPT 2011

30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings

Editors:

ISBN: 978-3-642-20464-7 (Print) 978-3-642-20465-4 (Online)

Table of contents (33 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Talks

    1. Book Chapter

      Pages 1-1

      The Arithmetic Codex: Theory and Applications

    2. Book Chapter

      Pages 2-6

      Lattice Reduction Algorithms: Theory and Practice

  3. Lattice-Based Cryptography

    1. Book Chapter

      Pages 7-26

      Efficient Authentication from Hard Learning Problems

    2. Book Chapter

      Pages 27-47

      Making NTRU as Secure as Worst-Case Problems over Ideal Lattices

  4. Implementation and Side Channels

    1. Book Chapter

      Pages 48-68

      Faster Explicit Formulas for Computing Pairings over Ordinary Curves

    2. Book Chapter

      Pages 69-88

      Pushing the Limits: A Very Compact and a Threshold Implementation of AES

    3. Book Chapter

      Pages 89-108

      Fully Leakage-Resilient Signatures

    4. Book Chapter

      Pages 109-128

      A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices

  5. Homomorphic Cryptography

    1. Book Chapter

      Pages 129-148

      Implementing Gentry’s Fully-Homomorphic Encryption Scheme

    2. Book Chapter

      Pages 149-168

      Homomorphic Signatures for Polynomial Functions

    3. Book Chapter

      Pages 169-188

      Semi-homomorphic Encryption and Multiparty Computation

  6. Signature Schemes

    1. Book Chapter

      Pages 189-206

      Tight Proofs for Signature Schemes without Random Oracles

    2. Book Chapter

      Pages 207-223

      Adaptive Pseudo-free Groups and Applications

    3. Book Chapter

      Pages 224-245

      Commuting Signatures and Verifiable Encryption

  7. Information-Theoretic Cryptography

    1. Book Chapter

      Pages 246-265

      Secure Authentication from a Weak Key, without Leaking Information

    2. Book Chapter

      Pages 266-283

      Secret Keys from Channel Noise

    3. Book Chapter

      Pages 284-302

      Almost Optimum t -Cheater Identifiable Secret Sharing Schemes

  8. Symmetric Key Cryptography

    1. Book Chapter

      Pages 303-322

      On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN

    2. Book Chapter

      Pages 323-342

      Domain Extension for MACs Beyond the Birthday Barrier

  9. Attacks and Algorithms

    1. Book Chapter

      Pages 343-363

      Statistical Attack on RC4

previous Page of 2