EUROCRYPT A*

35 papers

YearTitle / Authors
2010A Simple BGN-Type Cryptosystem from LWE.
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2010Adaptive Trapdoor Functions and Chosen-Ciphertext Security.
Eike Kiltz, Payman Mohassel, Adam O'Neill
2010Adaptively Secure Broadcast.
Martin Hirt, Vassilis Zikas
2010Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings
Henri Gilbert
2010Algebraic Cryptanalysis of McEliece Variants with Compact Keys.
Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich
2010Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
Alex Biryukov, Ivica Nikolic
2010Bonsai Trees, or How to Delegate a Lattice Basis.
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert
2010Bounded Key-Dependent Message Security.
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai
2010Computational Soundness, Co-induction, and Encryption Cycles.
Daniele Micciancio
2010Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions.
Rafael Pass, Hoeteck Wee
2010Constructing Verifiable Random Functions with Large Input Spaces.
Susan Hohenberger, Brent Waters
2010Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups.
David Mandell Freeman
2010Cryptographic Agility and Its Relation to Circular Encryption.
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash
2010Cryptography between Wonderland and Underland.
Moti Yung
2010Efficient Device-Independent Quantum Key Distribution.
Esther Hänggi, Renato Renner, Stefan Wolf
2010Efficient Lattice (H)IBE in the Standard Model.
Shweta Agrawal, Dan Boneh, Xavier Boyen
2010Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks.
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
2010Fully Homomorphic Encryption over the Integers.
Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
2010Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters
2010Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir
2010Lattice Enumeration Using Extreme Pruning.
Nicolas Gama, Phong Q. Nguyen, Oded Regev
2010Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation.
Jooyoung Lee, John P. Steinberger
2010New Generic Algorithms for Hard Knapsacks.
Nick Howgrave-Graham, Antoine Joux
2010On Ideal Lattices and Learning with Errors over Rings.
Vadim Lyubashevsky, Chris Peikert, Oded Regev
2010On the Impossibility of Three-Move Blind Signature Schemes.
Marc Fischlin, Dominique Schröder
2010Partial Fairness in Secure Two-Party Computation.
S. Dov Gordon, Jonathan Katz
2010Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography.
Ivan Damgård, Yuval Ishai, Mikkel Krøigaard
2010Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR.
Kenneth G. Paterson, Gaven J. Watson
2010Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases.
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan
2010Public-Key Encryption in the Bounded-Retrieval Model.
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs
2010Secure Message Transmission with Small Public Discussion.
Juan A. Garay, Clint Givens, Rafail Ostrovsky
2010Secure Obfuscation for Encrypted Signatures.
Satoshi Hada
2010Stam's Collision Resistance Conjecture.
John P. Steinberger
2010Universal One-Way Hash Functions via Inaccessible Entropy.
Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil P. Vadhan, Hoeteck Wee
2010Universally Composable Quantum Multi-party Computation.
Dominique Unruh