Advances in Cryptology – CRYPTO 2010

30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings

Editors:

ISBN: 978-3-642-14622-0 (Print) 978-3-642-14623-7 (Online)

Table of contents (39 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Leakage

    1. Book Chapter

      Pages 1-20

      Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability

    2. Book Chapter

      Pages 21-40

      Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks

    3. Book Chapter

      Pages 41-58

      Protecting Cryptographic Keys against Continual Leakage

    4. Book Chapter

      Pages 59-79

      Securing Computation against Continuous Leakage

  3. Lattice

    1. Book Chapter

      Pages 80-97

      An Efficient and Parallel Gaussian Sampler for Lattices

    2. Book Chapter

      Pages 98-115

      Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE

  4. Homomorphic Encryption

    1. Book Chapter

      Pages 116-137

      Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness

    2. Book Chapter

      Pages 138-154

      Additively Homomorphic Encryption with d-Operand Multiplications

    3. Book Chapter

      Pages 155-172

      i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits

  5. Theory and Applications

    1. Book Chapter

      Pages 173-190

      Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography

    2. Book Chapter

      Pages 191-208

      Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption

    3. Book Chapter

      Pages 209-236

      Structure-Preserving Signatures and Commitments to Group Elements

    4. Book Chapter

      Pages 237-254

      Efficient Indifferentiable Hashing into Ordinary Elliptic Curves

  6. Key Exchange, OAEP/RSA, CCA

    1. Book Chapter

      Pages 255-276

      Credential Authenticated Identification and Key Exchange

    2. Book Chapter

      Pages 277-294

      Password-Authenticated Session-Key Generation on the Internet in the Plain Model

    3. Book Chapter

      Pages 295-313

      Instantiability of RSA-OAEP under Chosen-Plaintext Attack

    4. Book Chapter

      Pages 314-332

      Efficient Chosen-Ciphertext Security via Extractable Hash Proofs

  7. Attacks

    1. Book Chapter

      Pages 333-350

      Factorization of a 768-Bit RSA Modulus

    2. Book Chapter

      Pages 351-369

      Correcting Errors in RSA Private Keys

    3. Book Chapter

      Pages 370-392

      Improved Differential Attacks for ECHO and Grøstl

previous Page of 2