Advances in Cryptology – EUROCRYPT 2013

32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings

Editors:

ISBN: 978-3-642-38347-2 (Print) 978-3-642-38348-9 (Online)

Table of contents (42 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-17

    Candidate Multilinear Maps from Ideal Lattices

  3. No Access

    Book Chapter

    Pages 18-34

    Lossy Codes and a New Variant of the Learning-With-Errors Problem

  4. No Access

    Book Chapter

    Pages 35-54

    A Toolkit for Ring-LWE Cryptography

  5. No Access

    Book Chapter

    Pages 55-75

    Regularity of Lossy RSA on Subdomains and Its Applications

  6. No Access

    Book Chapter

    Pages 76-92

    Efficient Cryptosystems from 2 k -th Power Residue Symbols

  7. No Access

    Book Chapter

    Pages 93-110

    Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions

  8. No Access

    Book Chapter

    Pages 111-125

    How to Watermark Cryptographic Functions

  9. No Access

    Book Chapter

    Pages 126-141

    Security Evaluations beyond Computing Power

  10. No Access

    Book Chapter

    Pages 142-159

    Masking against Side-Channel Attacks: A Formal Security Proof

  11. No Access

    Book Chapter

    Pages 160-176

    Leakage-Resilient Cryptography from Minimal Assumptions

  12. No Access

    Book Chapter

    Pages 177-193

    Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields

  13. No Access

    Book Chapter

    Pages 194-210

    Fast Cryptography in Genus 2

  14. No Access

    Book Chapter

    Pages 211-227

    Graph-Theoretic Algorithms for the “Isomorphism of Polynomials” Problem

  15. No Access

    Book Chapter

    Pages 228-244

    Cryptanalysis of Full RIPEMD-128

  16. No Access

    Book Chapter

    Pages 245-261

    New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis

  17. No Access

    Book Chapter

    Pages 262-278

    Improving Local Collisions: New Attacks on Reduced SHA-256

  18. No Access

    Book Chapter

    Pages 279-295

    Dynamic Proofs of Retrievability via Oblivious RAM

  19. No Access

    Book Chapter

    Pages 296-312

    Message-Locked Encryption and Secure Deduplication

  20. No Access

    Book Chapter

    Pages 313-314

    Keccak

  21. No Access

    Book Chapter

    Pages 315-335

    Batch Fully Homomorphic Encryption over the Integers

previous Page of 3