Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. (English) Zbl 1214.94003

Lecture Notes in Computer Science 6632. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). xiv, 628 p. (2011).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see Zbl 1188.94008.
Indexed articles:
Cramer, Ronald, The arithmetic codex: theory and applications. (Abstract), 1 [Zbl 1281.94021]
Nguyen, Phong Q., Lattice reduction algorithms: theory and practice, 2-6 [Zbl 1281.94046]
Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele, Efficient authentication from hard learning problems, 7-26 [Zbl 1281.94083]
Stehlé, Damien; Steinfeld, Ron, Making NTRU as secure as worst-case problems over ideal lattices, 27-47 [Zbl 1281.94057]
Aranha, Diego F.; Karabina, Koray; Longa, Patrick; Gebotys, Catherine H.; López, Julio, Faster explicit formulas for computing pairings over ordinary curves, 48-68 [Zbl 1282.14046]
Moradi, Amir; Poschmann, Axel; Ling, San; Paar, Christof; Wang, Huaxiong, Pushing the limits: a very compact and a threshold implementation of AES, 69-88 [Zbl 1281.94044]
Boyle, Elette; Segev, Gil; Wichs, Daniel, Fully leakage-resilient signatures, 89-108 [Zbl 1281.94075]
Renauld, Mathieu; Standaert, François-Xavier; Veyrat-Charvillon, Nicolas; Kamel, Dina; Flandre, Denis, A formal study of power variability issues and side-channel attacks for nanoscale devices, 109-128 [Zbl 1281.94051]
Gentry, Craig; Halevi, Shai, Implementing Gentry’s fully-homomorphic encryption scheme, 129-148 [Zbl 1281.94026]
Boneh, Dan; Freeman, David Mandell, Homomorphic signatures for polynomial functions, 149-168 [Zbl 1281.94072]
Bendlin, Rikke; Damgård, Ivan; Orlandi, Claudio; Zakarias, Sarah, Semi-homomorphic encryption and multiparty computation, 169-188 [Zbl 1281.94015]
Schäge, Sven, Tight proofs for signature schemes without random oracles, 189-206 [Zbl 1281.94087]
Catalano, Dario; Fiore, Dario; Warinschi, Bogdan, Adaptive pseudo-free groups and applications, 207-223 [Zbl 1281.94018]
Fuchsbauer, Georg, Commuting signatures and verifiable encryption, 224-245 [Zbl 1281.94079]
Bouman, Niek J.; Fehr, Serge, Secure authentication from a weak key, without leaking information, 246-265 [Zbl 1281.94073]
Ahmadi, Hadi; Safavi-Naini, Reihaneh, Secret keys from channel noise, 266-283 [Zbl 1281.94010]
Obana, Satoshi, Almost optimum \(t\)-cheater identifiable secret sharing schemes, 284-302 [Zbl 1281.94048]
Leander, Gregor, On linear hulls, statistical saturation attacks, PRESENT and a cryptanalysis of PUFFIN, 303-322 [Zbl 1281.94035]
Dodis, Yevgeniy; Steinberger, John, Domain extension for MACs beyond the birthday barrier, 323-342 [Zbl 1281.94022]
Sepehrdad, Pouyan; Vaudenay, Serge; Vuagnoux, Martin, Statistical attack on RC4. Distinguishing WPA, 343-363 [Zbl 1281.94053]
Becker, Anja; Coron, Jean-Sébastien; Joux, Antoine, Improved generic algorithms for hard knapsacks, 364-385 [Zbl 1281.94014]
Shelat, Abhi; Shen, Chih-hao, Two-output secure computation with malicious adversaries, 386-405 [Zbl 1282.68086]
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit, Efficient non-interactive secure computation, 406-425 [Zbl 1290.94151]
Asharov, Gilad; Canetti, Ran; Hazay, Carmit, Towards a game theoretic view of secure computation, 426-445 [Zbl 1290.94143]
Lindell, Yehuda, Highly-efficient universally-composable commitments based on the DDH assumption, 446-466 [Zbl 1291.68037]
Unruh, Dominique, Concurrent composition in the bounded quantum storage model, 467-486 [Zbl 1291.81122]
Ristenpart, Thomas; Shacham, Hovav; Shrimpton, Thomas, Careful with composition: limitations of the indifferentiability framework, 487-506 [Zbl 1290.94155]
Malkin, Tal; Teranishi, Isamu; Yung, Moti, Efficient circuit-size independent public key encryption with KDM security, 507-526 [Zbl 1290.94108]
Applebaum, Benny, Key-dependent message security: generic amplification and completeness, 527-546 [Zbl 1291.94048]
Lewko, Allison; Waters, Brent, Unbounded HIBE and attribute-based encryption, 547-567 [Zbl 1290.94105]
Lewko, Allison; Waters, Brent, Decentralizing attribute-based encryption, 568-588 [Zbl 1290.94106]
Wee, Hoeteck, Threshold and revocation cryptosystems via extractable hash proofs, 589-609 [Zbl 1290.94137]
Dürmuth, Markus; Freeman, David Mandell, Deniable encryption with negligible detection probability: an interactive construction, 610-626 [Zbl 1290.94068]


94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest


Zbl 1188.94008
Full Text: DOI