Advances in Cryptology – CRYPTO 2010

30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings

  • Tal Rabin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6223)

Table of contents

  1. Front Matter
  2. Leakage

  3. Lattice

  4. Homomorphic Encryption

    1. Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
      Pages 138-154
    2. Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
      Pages 155-172
  5. Theory and Applications

    1. Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
      Pages 173-190
    2. Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo
      Pages 209-236
    3. Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
      Pages 237-254
  6. Key Exchange, OAEP/RSA, CCA

    1. Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
      Pages 255-276
    2. Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
      Pages 277-294
    3. Eike Kiltz, Adam O’Neill, Adam Smith
      Pages 295-313
  7. Attacks

    1. Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos et al.
      Pages 333-350
    2. Wilko Henecka, Alexander May, Alexander Meurer
      Pages 351-369

About these proceedings

Keywords

AES Hashing Internet Permutation algebraic geometry authentication block ciphers collision resistance complexity cryptography embedded systems security trust

Editors and affiliations

  • Tal Rabin
    • 1
  1. 1.IBM T.J.Watson Research CenterHawthorneUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-14623-7
  • Copyright Information International Association for Cryptologic Research 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-14622-0
  • Online ISBN 978-3-642-14623-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book