Advertisement

Advances in Cryptology – CRYPTO 2010

30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings

  • Tal Rabin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6223)

Table of contents

  1. Front Matter
  2. Leakage

  3. Lattice

  4. Homomorphic Encryption

    1. Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
      Pages 138-154
    2. Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
      Pages 155-172
  5. Theory and Applications

    1. Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
      Pages 173-190
    2. Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo
      Pages 209-236
    3. Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
      Pages 237-254
  6. Key Exchange, OAEP/RSA, CCA

    1. Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
      Pages 255-276
    2. Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
      Pages 277-294
    3. Eike Kiltz, Adam O’Neill, Adam Smith
      Pages 295-313
  7. Attacks

    1. Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos et al.
      Pages 333-350
    2. Wilko Henecka, Alexander May, Alexander Meurer
      Pages 351-369
  8. Composition

    1. Dominique Unruh, Jörn Müller-Quade
      Pages 411-428
    2. Huijia Lin, Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
      Pages 429-446
    3. Chongwon Cho, Chen-Kuei Lee, Rafail Ostrovsky
      Pages 447-464
  9. Computation Delegation and Obfuscation

    1. Rosario Gennaro, Craig Gentry, Bryan Parno
      Pages 465-482
    2. Kai-Min Chung, Yael Kalai, Salil Vadhan
      Pages 483-501
    3. Benny Pinkas, Tzachy Reinman
      Pages 502-519
    4. Nir Bitansky, Ran Canetti
      Pages 520-537
  10. Multiparty Computation

    1. Amos Beimel, Eran Omri, Ilan Orlov
      Pages 538-557
    2. Yuval Ishai, Eyal Kushilevitz, Anat Paskin
      Pages 577-594
    3. Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
      Pages 595-612
  11. Pseudorandomness

  12. Quantum

    1. Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail
      Pages 685-706
    2. Severin Winkler, Jürg Wullschleger
      Pages 707-723
    3. Niek J. Bouman, Serge Fehr
      Pages 724-741
  13. Back Matter

About these proceedings

Keywords

AES Hashing Internet Permutation algebraic geometry authentication block ciphers collision resistance complexity cryptography embedded systems security trust

Editors and affiliations

  • Tal Rabin
    • 1
  1. 1.IBM T.J.Watson Research CenterHawthorneUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-14623-7
  • Copyright Information International Association for Cryptologic Research 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-14622-0
  • Online ISBN 978-3-642-14623-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site