© 2010

Advances in Cryptology – CRYPTO 2010

30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings

  • Tal Rabin
  • Up-to-date research in cryptology

Conference proceedings CRYPTO 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6223)

Table of contents

  1. Front Matter
  2. Leakage

  3. Lattice

  4. Homomorphic Encryption

    1. Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
      Pages 138-154
    2. Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
      Pages 155-172
  5. Theory and Applications

    1. Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
      Pages 173-190
    2. Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo
      Pages 209-236
    3. Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
      Pages 237-254
  6. Key Exchange, OAEP/RSA, CCA

    1. Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
      Pages 255-276
    2. Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
      Pages 277-294
    3. Eike Kiltz, Adam O’Neill, Adam Smith
      Pages 295-313
  7. Attacks

    1. Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos et al.
      Pages 333-350
    2. Wilko Henecka, Alexander May, Alexander Meurer
      Pages 351-369

About these proceedings


AES Hashing Internet Permutation algebraic geometry authentication block ciphers collision resistance complexity cryptography embedded systems security trust

Editors and affiliations

  • Tal Rabin
    • 1
  1. 1.IBM T.J.Watson Research CenterHawthorneUSA

Bibliographic information