EUROCRYPT 2010:
Henri Gilbert (Ed.):
Advances in Cryptology - EUROCRYPT 2010 - EUROCRYPT 2010,
29th Annual International Conference on the Theory and Applications of Cryptographic Techniques,
French Riviera, May 30 - June 3, 2010
Proceedings.
EUROCRYPT 2010
French Riviera, May 30 - June 3, 2010
Organizational Committee
Program Chairs : | Henri Gilbert |
General Chair : | Matthew J. B. Robshaw and Olivier Billet |
Program Committee
Dan Boneh |
Ran Canetti |
Anne Canteaut |
Carlos Cid |
Jean-Sébastien Coron |
Ivan Damgård |
Steven D. Galbraith |
Rosario Gennaro |
Helena Handschuh |
Stanislaw Jarecki |
Antoine Joux |
Marc Joye |
Ari Juels |
Aggelos Kiayias |
Lars R. Knudsen |
Arjen K. Lenstra |
Helger Lipmaa |
Mitsuru Matsui |
Alexander May |
Tatsuaki Okamoto |
Krzysztof Pietrzak |
David Pointcheval |
Bart Preneel |
Phillip Rogaway |
Amit Sahai |
Berry Schoenmakers |
Ron Steinfeld |
Frederik Vercauteren |
Yiqun Lisa Yin |
External Referees
Zero-Knowledge
-
On Ideal Lattices and Learning with Errors over Rings.
, 1-23,
Chris Peikert
,
Oded Regev
,
Vadim Lyubashevsky
bib info -
Fully Homomorphic Encryption over the Integers.
, 24-43,
Shai Halevi
,
Marten van Dijk
,
Craig Gentry
,
Vinod Vaikuntanathan
bib info -
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups.
, 44-61,
David Mandell Freeman
bib info -
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
, 62-91,
Tatsuaki Okamoto
,
Amit Sahai
,
Brent Waters
,
Katsuyuki Takashima
,
Allison B. Lewko
bib info
Obfuscation and Side Channel Security
-
Secure Obfuscation for Encrypted Signatures.
, 92-112,
Satoshi Hada
bib info -
Public-Key Encryption in the Bounded-Retrieval Model.
, 113-134,
Moni Naor
,
Joël Alwen
,
Yevgeniy Dodis
,
Gil Segev
,
Shabsi Walfish
,
Daniel Wichs
bib info -
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
, 135-156,
Leonid Reyzin
,
Eran Tromer
,
Vinod Vaikuntanathan
,
Tal Rabin
,
Sebastian Faust
bib info
2-Party Protocols
-
Partial Fairness in Secure Two-Party Computation.
, 157-176,
Jonathan Katz
,
S. Dov Gordon
bib info -
Secure Message Transmission with Small Public Discussion.
, 177-196,
Rafail Ostrovsky
,
Juan A. Garay
,
Clint Givens
bib info -
On the Impossibility of Three-Move Blind Signature Schemes.
, 197-215,
Marc Fischlin
,
Dominique Schröder
bib info -
Efficient Device-Independent Quantum Key Distribution.
, 216-234,
Stefan Wolf
,
Renato Renner
,
Esther Hänggi
bib info
Cryptanalysis
-
New Generic Algorithms for Hard Knapsacks.
, 235-256,
Nick Howgrave-Graham
,
Antoine Joux
bib info -
Lattice Enumeration Using Extreme Pruning.
, 257-278,
Phong Q. Nguyen
,
Oded Regev
,
Nicolas Gama
bib info -
Algebraic Cryptanalysis of McEliece Variants with Compact Keys.
, 279-298,
Jean-Charles Faugère
,
Jean-Pierre Tillich
,
Ludovic Perret
,
Ayoub Otmani
bib info -
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
, 299-319,
Orr Dunkelman
,
Nathan Keller
,
Alex Biryukov
,
Adi Shamir
,
Dmitry Khovratovich
bib info
2010 IACR Distinguished Lecture
Automated Tools and Formal Methods
-
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
, 322-344,
Alex Biryukov
,
Ivica Nikolic
bib info -
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR.
, 345-361,
Kenneth G. Paterson
,
Gaven J. Watson
bib info -
Computational Soundness, Co-induction, and Encryption Cycles.
, 362-380,
Daniele Micciancio
bib info
Models and Proofs
-
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks.
, 381-402,
Serge Fehr
,
Eike Kiltz
,
Dennis Hofheinz
,
Hoeteck Wee
bib info -
Cryptographic Agility and Its Relation to Circular Encryption.
, 403-422,
Mihir Bellare
,
David Cash
,
Mira Belenkiy
,
Tolga Acar
bib info -
Bounded Key-Dependent Message Security.
, 423-444,
Dennis Hofheinz
,
Boaz Barak
,
Yuval Ishai
,
Iftach Haitner
bib info
Multiparty Protocols
-
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography.
, 445-465,
Ivan Damgård
,
Yuval Ishai
,
Mikkel Krøigaard
bib info -
Adaptively Secure Broadcast.
, 466-485,
Martin Hirt
,
Vassilis Zikas
bib info -
Universally Composable Quantum Multi-party Computation.
, 486-505,
Dominique Unruh
bib info
Cryptosystems II
-
A Simple BGN-Type Cryptosystem from LWE.
, 506-522,
Shai Halevi
,
Craig Gentry
,
Vinod Vaikuntanathan
bib info -
Bonsai Trees, or How to Delegate a Lattice Basis.
, 523-552,
Eike Kiltz
,
Chris Peikert
,
Dennis Hofheinz
,
David Cash
bib info -
Efficient Lattice (H)IBE in the Standard Model.
, 553-572,
Dan Boneh
,
Xavier Boyen
,
Shweta Agrawal
bib info
Hash and MAC
-
Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation.
, 573-596,
John P. Steinberger
,
Jooyoung Lee
bib info -
Stam's Collision Resistance Conjecture.
, 597-615,
John P. Steinberger
bib info -
Universal One-Way Hash Functions via Inaccessible Entropy.
, 616-637,
Salil P. Vadhan
,
Hoeteck Wee
,
Thomas Holenstein
,
Omer Reingold
,
Iftach Haitner
bib info
Foundational Primitives
-
Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions.
, 638-655,
Rafael Pass
,
Hoeteck Wee
bib info -
Constructing Verifiable Random Functions with Large Input Spaces.
, 656-672,
Susan Hohenberger
,
Brent Waters
bib info -
Adaptive Trapdoor Functions and Chosen-Ciphertext Security.
, 673-692,
Eike Kiltz
,
Payman Mohassel
,
Adam O'Neill
bib info
Author Index