© 2011

Advances in Cryptology – EUROCRYPT 2011

30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings

  • Kenneth G. Paterson
Conference proceedings EUROCRYPT 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6632)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Lattice-Based Cryptography

    1. Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi
      Pages 7-26
    2. Damien Stehlé, Ron Steinfeld
      Pages 27-47
  4. Implementation and Side Channels

    1. Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López
      Pages 48-68
    2. Amir Moradi, Axel Poschmann, San Ling, Christof Paar, Huaxiong Wang
      Pages 69-88
    3. Elette Boyle, Gil Segev, Daniel Wichs
      Pages 89-108
    4. Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Dina Kamel, Denis Flandre
      Pages 109-128
  5. Homomorphic Cryptography

    1. Craig Gentry, Shai Halevi
      Pages 129-148
    2. Dan Boneh, David Mandell Freeman
      Pages 149-168
    3. Rikke Bendlin, Ivan Damgård, Claudio Orlandi, Sarah Zakarias
      Pages 169-188
  6. Signature Schemes

    1. Dario Catalano, Dario Fiore, Bogdan Warinschi
      Pages 207-223
    2. Georg Fuchsbauer
      Pages 224-245
  7. Information-Theoretic Cryptography

    1. Hadi Ahmadi, Reihaneh Safavi-Naini
      Pages 266-283
  8. Symmetric Key Cryptography

About these proceedings


This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011.
The 31 papers, presented together with 2 invited talks, were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on lattice-base cryptography, implementation and side channels, homomorphic cryptography, signature schemes, information-theoretic cryptography, symmetric key cryptography, attacks and algorithms, secure computation, composability, key dependent message security, and public key encryption.


authentication cryptanalysis cryptography multi-party computation oblivious transfer

Editors and affiliations

  • Kenneth G. Paterson
    • 1
  1. 1.Information Security Group (ISG)University of LondonEghamUK

Bibliographic information