EUROCRYPT 2011:
Kenneth G. Paterson (Ed.):
Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2011,
Tallinn,
Estonia,
May 15-19, 2011
Proceedings.
EUROCRYPT 2011
Estonia,
May 15-19, 2011
Organizational Committee
Program Chairs : | Kenneth G. Paterson | |
General Chair : | Helger Lipmaa |
Program Committee
Michel Abdalla |
Daniel J. Bernstein |
Xavier Boyen |
Christian Cachin |
Orr Dunkelman |
Pierrick Gaudry |
Henri Gilbert |
Jonathan Katz |
Yoshi Kohno |
BenoƮt Libert |
Anna Lysyanskaya |
Vadim Lyubashevsky |
Alexander May |
Alfred Menezes |
Tatsuaki Okamoto |
Rafail Ostrovsky |
Elisabeth Oswald |
Christof Paar |
Chris Peikert |
Renato Renner |
Vincent Rijmen |
Berry Schoenmakers |
Michael Scott |
Hovav Shacham |
Thomas Shrimpton |
Martijn Stam |
Douglas R. Stinson |
Frederik Vercauteren |
Sub-Reviewers
Sponsors
The European Regional Development Fund (ERDF)
Guardtime
Qualcomm
Swedbank
- Invited Talks
-
The Arithmetic Codex: Theory and Applications
, 1,
Ronald Cramer
bib info -
Lattice Reduction Algorithms: Theory and Practice
, 2,
Phong Q. Nguyen
bib info - Lattice Reduction Algorithms: Theory and Practice
-
Efficient Authentication from Hard Learning Problems
, 7,
Eike Kiltz
,
Krzysztof Pietrzak
,
David Cash
,
Abhishek Jain
,
Daniele Venturi
bib info -
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices
, 27,
Ron Steinfeld
,
Damien Stehle
bib info - Implementation and Side Channels
-
Faster Explicit Formulas for Computing Pairings over Ordinary Curves
, 48,
Catherine H. Gebotys
,
Koray Karabina
,
Patrick Longa
,
Julio Lopez
,
Diego F. Aranha
bib info -
Pushing the Limits: A Very Compact and a Threshold Implementation of AES
, 69,
Huaxiong Wang
,
Christof Paar
,
Axel Poschmann
,
San Ling
,
Amir Moradi
bib info -
Fully Leakage-Resilient Signatures
, 89,
Gil Segev
,
Daniel Wichs
,
Elette Boyle
bib info -
A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
, 109,
Francois-Xavier Standaert
,
Mathieu Renauld
,
Nicolas Veyrat- Charvillon
,
Dina Kamel
,
Denis Flandre
bib info - Homomorphic Cryptography
-
Implementing Gentry's Fully-Homomorphic Encryption Scheme
, 129,
Shai Halevi
,
Craig Gentry
bib info -
Homomorphic Signatures for Polynomial Functions
, 149,
Dan Boneh
,
David Mandell Freeman
bib info -
Semi-Homomorphic Encryption and Multiparty Computation
, 169,
Ivan Damgard
,
Claudio Orlandi
,
Rikke Bendlin
,
Sarah Zakaria
bib info - Signature Schemes
-
Tight Proofs for Signature Schemes without Random Oracles
, 189,
Sven Schage
bib info -
Adaptive Pseudo-Free Groups and Applications
, 207,
Dario Catalano
,
Bogdan Warinschi
,
Dario Fiore
bib info -
Commuting Signatures and Verifiable Encryption
, 224,
Georg Fuchsbauer
bib info - Information-theoretic Cryptography
-
Secure Authentication from a Weak Key, Without Leaking Information
, 246,
Serge Fehr
,
Niek J. Bouman
bib info -
Secret Keys from Channel Noise
, 266,
Reihaneh Safavi-Naini
,
Hadi Ahmadi
bib info -
Almost Optimum t-Cheater Identifiable Secret Sharing Schemes
, 284,
Satoshi Obana
bib info - Symmetric Key Cryptography
-
On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN
, 303,
Gregor Leander
bib info -
Domain Extension for MACs Beyond the Birthday Barrier
, 323,
Yevgeniy Dodis
,
John Steinberger
bib info - Attacks and Algorithms
-
Statistical Attack on RC4
, 343,
Serge Vaudenay
,
Martin Vuagnoux
,
Pouyan Sepehrdad
bib info -
Improved Generic Algorithms for Hard Knapsacks
, 364,
Jean-Sebastien Coron
,
Antoine Joux
,
Anja Becker
bib info - Secure Computation
-
Two-output Secure Computation With Malicious Adversaries
, 386,
abhi shelat
,
Chih-hao Shen
bib info -
Effcient Non-Interactive Secure Computation
, 406,
Rafail Ostrovsky
,
Amit Sahai
,
Eyal Kushilevitz
,
Yuval Ishai
,
Manoj Prabhakaran
bib info -
Towards a Game Theoretic View of Secure Computation
, 426,
Ran Canetti
,
Carmit Hazay
,
Gilad Asharov
bib info -
Highly-Efficient Universally-Composable Commitments based on the DDH Assumption
, 446,
Yehuda Lindell
bib info - Composability
-
Concurrent composition in the bounded quantum storage model
, 467,
Dominique Unruh
bib info -
Careful with Composition: Limitations of the Indifferentiability Framework
, 487,
Thomas Ristenpart
,
Hovav Shacham
,
Thomas Shrimpton
bib info - Key Dependent Message Security
-
Efficient Circuit-Size Independent Public Key Encryption with KDM Security
, 507,
Moti Yung
,
Tal Malkin
,
Isamu Teranishi
bib info -
Key-Dependent Message Security: Generic Amplification and Completenes
, 527,
Benny Applebaum
bib info - Public Key Encryption
-
Unbounded HIBE and Attribute-Based Encryption
, 547,
Brent Waters
,
Allison Lewko
bib info NULL -
Decentralizing Attribute-Based Encryption
, 568,
Brent Waters
,
Allison Lewko
bib info -
Threshold and Revocation Cryptosystems via Extractable Hash Proofs
, 589,
Hoeteck Wee
bib info -
Deniable Encryption with Negligible Detection Probability: An Interactive Construction
, 610,
Markus Durmuth
,
David Mandell Freeman
bib info
Author Index