skip to content
Advances in cryptology--EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings Preview this item
ClosePreview this item
Checking...

Advances in cryptology--EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings

Author: Henri Gilbert
Publisher: Berlin : Springer, 2010.
Series: Lecture notes in computer science, 6110.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:
Annotation
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Congresses
Conference papers and proceedings
Additional Physical Format: Print version:
Advances in cryptology - EUROCRYPT 2010.
Berlin : Springer, 2010
(DLC) 2010926925
(OCoLC)635376269
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Henri Gilbert
ISBN: 9783642131905 3642131905
OCLC Number: 639007889
Description: 1 online resource (xiii, 694 pages) : illustrations.
Contents: Cryptosystems I. On ideal lattices and learning with errors over rings / Vadim Lyubashevsky, Chris Peikert, and Oded Regev --
Fully homomorphic encryption over the integers / Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan --
Converting pairing-based cryptosystems from composite-order groups to prime-order groups / David Mandell Freeman --
Fully secure functional encryption : attribute-based encryption and (hierarchical) inner product encryption / Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters --
Obfuscation and side channel security. Secure obfuscation for encrypted signatures / Satoshi Hada --
Public-key encryption in the bounded-retrieval model / Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, and Daniel Wichs --
Protecting circuits from leakage : the computationally-bounded and noisy cases / Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, and Vinod Vaikuntanathan --
2-party protocols. Partial fairness in secure two-party computation / S. Dov Gordon and Jonathan Katz --
Secure message transmission with small public discussion / Juan Garay, Clint Givens, and Rafail Ostrovsky --
On the impossibility of three-move blind signature schemes / Marc Fischlin and Dominique Schröder --
Efficient device-independent quantum key distribution / Esther Hänggi, Renato Renner, and Stefan Wolf --
Cryptanalysis. New generic algorithms for hard knapsacks / Nick Howgrave-Graham and Antoine Joux --
Lattice enumeration using extreme pruning / Nicolas Gama, Phong Q. Nguyen, and Oded Regev --
Algebraic cryptanalysis of McEliece variants with compact keys / Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, and Jean-Pierre Tillich --
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds / Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir --
2010 IACR distinguished lecture. Cryptography between wonderland and underland / Moti Yung --
Automated tools and formal methods. Automatic search for related-key differential characteristics in byte-oriented block ciphers : application to AES, Camellia, Khazad and others / Alex Biryukov and Ivica Nikolić --
Plaintext-dependent decryption : a formal security treatment of SSH-CTR / Kenneth G. Paterson and Gaven J. Watson --
Computational soundness, co-induction, and encryption cycles / Daniele Micciancio --
Models and proofs. Encryption schemes secure against chosen-ciphertext selective opening attacks / Serge Fehr, Dennis Hofheinz, Eike Kiltz, and Hoeteck Wee --
Cryptographic agility and its relation to circular encryption / Tolga Acar, Mira Belenkiy, Mihir Bellare, and David Cash --
Bounded key-dependent message security / Boaz Barak, Iftach Haitner, Dennis Hofheinz, and Yuval Ishai --
Multiparty protocols. Perfectly secure multiparty computation and the computational overhead of cryptography / Ivan Damgård, Yuval Ishai, and Mikkel Krøigaard --
Adaptively secure broadcast / Martin Hirt and Vassilis Zikas --
Universally composable quantum multi-party computation / Dominique Unruh --
Cryptosystems II. A simple BGN-type cryptosystem from LWE / Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan --
Bonsai trees, or how to delegate a lattice basis / David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert --
Efficient lattice (H)IBE in the standard model / Shweta Agrawal, Dan Boneh, and Xavier Boyen --
Hash and MAC. Multi-property-preserving domain extension using polynomial-based modes of operation / Jooyoung Lee and John Steinberger --
Stam's collision resistance conjecture / John Steinberger --
Universal one-way hash functions via inaccessible entropy / Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, and Hoeteck Wee --
Foundational primitives. Constant-round non-malleable commitments from sub-exponential one-way functions / Rafael Pass and Hoeteck Wee --
Constructing verifiable random functions with large input spaces / Susan Hohenberger and Brent Waters --
Adaptive trapdoor functions and chosen-ciphertext security / Eike Kiltz, Payman Mohassel, and Adam O'Neill.
Series Title: Lecture notes in computer science, 6110.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: EUROCRYPT 2010
Responsibility: Henri Gilbert (ed.).

Abstract:

Constitutes the refereed proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2010, held on the French Riviera, in May/June  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/639007889> # Advances in cryptology--EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "639007889" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/910965386#Place/berlin> ; # Berlin
    schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/910965386#Topic/cryptography> ; # Cryptography
    schema:about <http://id.worldcat.org/fast/888018> ; # Data transmission systems--Security measures
    schema:about <http://dewey.info/class/005.82/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/910965386#Topic/computers_access_control> ; # Computers--Access control
    schema:about <http://experiment.worldcat.org/entity/work/data/910965386#Topic/data_transmission_systems_security_measures> ; # Data transmission systems--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/910965386#Topic/computer_security> ; # Computer Security
    schema:about <http://experiment.worldcat.org/entity/work/data/910965386#Topic/computing_methodologies> ; # Computing Methodologies
    schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
    schema:alternateName "EUROCRYPT 2010" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/910965386#Person/gilbert_henri> ; # Henri Gilbert
    schema:creator <http://experiment.worldcat.org/entity/work/data/910965386#Meeting/eurocrypt_2010_2010_riveria_france> ; # EUROCRYPT 2010 (2010 : Riveria, France)
    schema:datePublished "2010" ;
    schema:description "Cryptosystems I. On ideal lattices and learning with errors over rings / Vadim Lyubashevsky, Chris Peikert, and Oded Regev -- Fully homomorphic encryption over the integers / Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan -- Converting pairing-based cryptosystems from composite-order groups to prime-order groups / David Mandell Freeman -- Fully secure functional encryption : attribute-based encryption and (hierarchical) inner product encryption / Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters -- Obfuscation and side channel security. Secure obfuscation for encrypted signatures / Satoshi Hada -- Public-key encryption in the bounded-retrieval model / Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, and Daniel Wichs -- Protecting circuits from leakage : the computationally-bounded and noisy cases / Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, and Vinod Vaikuntanathan -- 2-party protocols. Partial fairness in secure two-party computation / S. Dov Gordon and Jonathan Katz -- Secure message transmission with small public discussion / Juan Garay, Clint Givens, and Rafail Ostrovsky -- On the impossibility of three-move blind signature schemes / Marc Fischlin and Dominique Schröder -- Efficient device-independent quantum key distribution / Esther Hänggi, Renato Renner, and Stefan Wolf -- Cryptanalysis. New generic algorithms for hard knapsacks / Nick Howgrave-Graham and Antoine Joux -- Lattice enumeration using extreme pruning / Nicolas Gama, Phong Q. Nguyen, and Oded Regev -- Algebraic cryptanalysis of McEliece variants with compact keys / Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, and Jean-Pierre Tillich -- Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds / Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir -- 2010 IACR distinguished lecture. Cryptography between wonderland and underland / Moti Yung -- Automated tools and formal methods. Automatic search for related-key differential characteristics in byte-oriented block ciphers : application to AES, Camellia, Khazad and others / Alex Biryukov and Ivica Nikolić -- Plaintext-dependent decryption : a formal security treatment of SSH-CTR / Kenneth G. Paterson and Gaven J. Watson -- Computational soundness, co-induction, and encryption cycles / Daniele Micciancio -- Models and proofs. Encryption schemes secure against chosen-ciphertext selective opening attacks / Serge Fehr, Dennis Hofheinz, Eike Kiltz, and Hoeteck Wee -- Cryptographic agility and its relation to circular encryption / Tolga Acar, Mira Belenkiy, Mihir Bellare, and David Cash -- Bounded key-dependent message security / Boaz Barak, Iftach Haitner, Dennis Hofheinz, and Yuval Ishai -- Multiparty protocols. Perfectly secure multiparty computation and the computational overhead of cryptography / Ivan Damgård, Yuval Ishai, and Mikkel Krøigaard -- Adaptively secure broadcast / Martin Hirt and Vassilis Zikas -- Universally composable quantum multi-party computation / Dominique Unruh -- Cryptosystems II. A simple BGN-type cryptosystem from LWE / Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan -- Bonsai trees, or how to delegate a lattice basis / David Cash, Dennis Hofheinz, Eike Kiltz, and Chris Peikert -- Efficient lattice (H)IBE in the standard model / Shweta Agrawal, Dan Boneh, and Xavier Boyen -- Hash and MAC. Multi-property-preserving domain extension using polynomial-based modes of operation / Jooyoung Lee and John Steinberger -- Stam's collision resistance conjecture / John Steinberger -- Universal one-way hash functions via inaccessible entropy / Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, and Hoeteck Wee -- Foundational primitives. Constant-round non-malleable commitments from sub-exponential one-way functions / Rafael Pass and Hoeteck Wee -- Constructing verifiable random functions with large input spaces / Susan Hohenberger and Brent Waters -- Adaptive trapdoor functions and chosen-ciphertext security / Eike Kiltz, Payman Mohassel, and Adam O'Neill."@en ;
    schema:description "Annotation"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/910965386> ;
    schema:genre "Congresses"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/910965386#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/910965386#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isSimilarTo <http://www.worldcat.org/oclc/635376269> ;
    schema:name "Advances in cryptology--EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings"@en ;
    schema:productID "639007889" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/639007889#PublicationEvent/berlin_springer_2010> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/910965386#Agent/springer> ; # Springer
    schema:url <http://site.ebrary.com/id/10394493> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=3065303> ;
    schema:url <http://dx.doi.org/10.1007/978-3-642-13190-5> ;
    schema:workExample <http://worldcat.org/isbn/9783642131905> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/639007889> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/910965386#Meeting/eurocrypt_2010_2010_riveria_france> # EUROCRYPT 2010 (2010 : Riveria, France)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/910965386#Place/riveria_france> ; # Riveria, France)
    schema:name "EUROCRYPT 2010 (2010 : Riveria, France)" ;
    .

<http://experiment.worldcat.org/entity/work/data/910965386#Person/gilbert_henri> # Henri Gilbert
    a schema:Person ;
    schema:familyName "Gilbert" ;
    schema:givenName "Henri" ;
    schema:name "Henri Gilbert" ;
    .

<http://experiment.worldcat.org/entity/work/data/910965386#Place/riveria_france> # Riveria, France)
    a schema:Place ;
    schema:name "Riveria, France)" ;
    .

<http://experiment.worldcat.org/entity/work/data/910965386#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/639007889> ; # Advances in cryptology--EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/910965386#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/639007889> ; # Advances in cryptology--EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings
    schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://experiment.worldcat.org/entity/work/data/910965386#Topic/computer_security> # Computer Security
    a schema:Intangible ;
    schema:name "Computer Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/910965386#Topic/computing_methodologies> # Computing Methodologies
    a schema:Intangible ;
    schema:name "Computing Methodologies"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/910965386#Topic/data_transmission_systems_security_measures> # Data transmission systems--Security measures
    a schema:Intangible ;
    schema:hasPart <http://id.loc.gov/authorities/subjects/sh85035869> ;
    schema:name "Data transmission systems--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
    schema:name "Computers--Access control"@en ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
    schema:name "Cryptography"@en ;
    .

<http://id.worldcat.org/fast/888018> # Data transmission systems--Security measures
    a schema:Intangible ;
    schema:name "Data transmission systems--Security measures"@en ;
    .

<http://worldcat.org/isbn/9783642131905>
    a schema:ProductModel ;
    schema:isbn "3642131905" ;
    schema:isbn "9783642131905" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/639007889> ; # Advances in cryptology--EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/oclc/635376269>
    a schema:CreativeWork ;
    rdfs:label "Advances in cryptology - EUROCRYPT 2010." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/639007889> ; # Advances in cryptology--EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings
    .

<http://www.worldcat.org/title/-/oclc/639007889>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/639007889> ; # Advances in cryptology--EUROCRYPT 2010 : 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30-June 3, 2010 : proceedings
    schema:dateModified "2016-07-05" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.