Advertisement

© 2009

Advances in Cryptology - EUROCRYPT 2009

28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings

  • Antoine Joux
Conference proceedings EUROCRYPT 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5479)

Table of contents

  1. Cryptosystems (2)

  2. Invited Talk

    1. Shafi Goldwasser
      Pages 369-370
  3. Security, Proofs and Models (2)

  4. Side Channels

    1. François-Xavier Standaert, Tal G. Malkin, Moti Yung
      Pages 443-461
    2. Krzysztof Pietrzak
      Pages 462-482
  5. Curves

    1. Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang
      Pages 483-501
    2. Christophe Doche, David R. Kohel, Francesco Sica
      Pages 502-517
    3. Steven D. Galbraith, Xibin Lin, Michael Scott
      Pages 518-535
  6. Randomness

    1. Michel Abdalla, Dario Catalano, Dario Fiore
      Pages 554-571
    2. Céline Chevalier, Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer
      Pages 572-589
    3. Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung
      Pages 590-609
  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009, held in Cologne, Germany, in April 2009.

The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 148 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on security, proofs, and models, hash cryptanalysis, group and broadcast encryption, cryptosystems, cryptanalysis, side channels, curves, and randomness.

Keywords

algebraic attacks anonymity authentication block ciphers computational number theory cryptanalysis cryptographic attacks cryptographic hash functions cryptographic protocols cryptographic systems cryptography cryptology data encryption database security

Editors and affiliations

  • Antoine Joux
    • 1
  1. 1.DGA and University of Versailles Saint-Quentin-en-YvelinesVersailles cedexFrance

Bibliographic information