Table of contents

  1. Front Matter
  2. Leakage

  3. Lattice

  4. Homomorphic Encryption

    1. Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
      Pages 138-154
    2. Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
      Pages 155-172
  5. Theory and Applications

    1. Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
      Pages 173-190
    2. Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo
      Pages 209-236
    3. Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
      Pages 237-254
  6. Key Exchange, OAEP/RSA, CCA

    1. Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
      Pages 255-276
    2. Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
      Pages 277-294
    3. Eike Kiltz, Adam O’Neill, Adam Smith
      Pages 295-313
  7. Attacks

    1. Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos et al.
      Pages 333-350
    2. Wilko Henecka, Alexander May, Alexander Meurer
      Pages 351-369

About these proceedings

Keywords

AES Hashing Internet Permutation algebraic geometry authentication block ciphers collision resistance complexity cryptography embedded systems security trust

Editors and affiliations

  • Tal Rabin
    • 1
  1. 1.IBM T.J.Watson Research CenterHawthorneUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-14623-7
  • Copyright Information International Association for Cryptologic Research 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-14622-0
  • Online ISBN 978-3-642-14623-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book