Advertisement

© 2010

Advances in Cryptology – CRYPTO 2010

30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings

  • Tal Rabin
  • Up-to-date research in cryptology

Conference proceedings CRYPTO 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6223)

Table of contents

  1. Attacks

  2. Composition

    1. Dominique Unruh, Jörn Müller-Quade
      Pages 411-428
    2. Huijia Lin, Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
      Pages 429-446
    3. Chongwon Cho, Chen-Kuei Lee, Rafail Ostrovsky
      Pages 447-464
  3. Computation Delegation and Obfuscation

    1. Rosario Gennaro, Craig Gentry, Bryan Parno
      Pages 465-482
    2. Kai-Min Chung, Yael Kalai, Salil Vadhan
      Pages 483-501
    3. Benny Pinkas, Tzachy Reinman
      Pages 502-519
    4. Nir Bitansky, Ran Canetti
      Pages 520-537
  4. Multiparty Computation

    1. Amos Beimel, Eran Omri, Ilan Orlov
      Pages 538-557
    2. Yuval Ishai, Eyal Kushilevitz, Anat Paskin
      Pages 577-594
    3. Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
      Pages 595-612
  5. Pseudorandomness

    1. Viet Tung Hoang, Phillip Rogaway
      Pages 613-630
    2. Anindya De, Luca Trevisan, Madhur Tulsiani
      Pages 649-665
  6. Quantum

    1. Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail
      Pages 685-706
    2. Severin Winkler, Jürg Wullschleger
      Pages 707-723
    3. Niek J. Bouman, Serge Fehr
      Pages 724-741

About these proceedings

Keywords

AES Hashing Internet Permutation algebraic geometry authentication block ciphers collision resistance complexity cryptography embedded systems security trust

Editors and affiliations

  • Tal Rabin
    • 1
  1. 1.IBM T.J.Watson Research CenterHawthorneUSA

Bibliographic information