Limit search to available items
Book Cover
E-book
Author EUROCRYPT (Conference) (31st : 2012 : Cambridge, England)

Title Advances in cryptology -- EUROCRYPT 2012 : 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings / David Pointcheval, Thomas Johansson (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource (xiv, 758 pages)
Series Lecture notes in computer science, 0302-9743 ; 7237
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7237.
LNCS sublibrary. SL 4, Security and cryptology.
Contents A Tutorial on High Performance Computing Applied to Cryptanalysis / (Invited Talk Abstract) / Antoine Joux -- Another Look at Provable Security / Alfred Menezes -- Cover and Decomposition Index Calculus on Elliptic Curves Made Practical / Application to a Previously Unreachable Curve over \mathbbFp6Fp6 / Antoine Joux and Vanessa Vitse -- Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields / Jean-Charles Faugère, Ludovic Perret, Christophe Petit and Guénaël Renault -- Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations / (Extended Abstract) / Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert and John Steinberger, et al. -- Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading / Peter Gaži and Stefano Tessaro -- Fair Computation with Rational Players / Adam Groce and Jonathan Katz
Concurrently Secure Computation in Constant Rounds / Sanjam Garg, Vipul Goyal, Abhishek Jain and Amit Sahai -- Identity-Based Encryption Resilient to Continual Auxiliary Leakage / Tsz Hon Yuen, Sherman S.M. Chow, Ye Zhang and Siu Ming Yiu -- Quantum Proofs of Knowledge / Dominique Unruh -- On Round-Optimal Zero Knowledge in the Bare Public-Key Model / Alessandra Scafuro and Ivan Visconti -- Robust Coin Flipping / Gene S. Kopp and John D. Wiltshire-Gordon -- Unconditionally-Secure Robust Secret Sharing with Compact Shares / Alfonso Cevallos, Serge Fehr, Rafail Ostrovsky and Yuval Rabani -- All-But-Many Lossy Trapdoor Functions / Dennis Hofheinz -- Identity-Based (Lossy) Trapdoor Functions and Applications / Mihir Bellare, Eike Kiltz, Chris Peikert and Brent Waters -- Dual Projective Hashing and Its Applications -- Lossy Trapdoor Functions and More / Hoeteck Wee -- Efficient Zero-Knowledge Argument for Correctness of a Shuffle / Stephanie Bayer and Jens Groth
Malleable Proof Systems and Applications / Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya and Sarah Meiklejohn -- Group to Group Commitments Do Not Shrink / Masayuki Abe, Kristiyan Haralambiev and Miyako Ohkubo -- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting / Allison Lewko -- Minimalism in Cryptography: The Even-Mansour Scheme Revisited / Orr Dunkelman, Nathan Keller and Adi Shamir -- Message Authentication, Revisited / Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak and Daniel Wichs -- Property Preserving Symmetric Encryption / Omkant Pandey and Yannis Rouselakis -- Narrow-Bicliques: Cryptanalysis of Full IDEA / Dmitry Khovratovich, Gaëtan Leurent and Christian Rechberger -- Cryptanalyses on a Merkle-Damgård Based MAC -- Almost Universal Forgery and Distinguishing-H Attacks / Yu Sasaki -- Statistical Tools Flavor Side-Channel Collision Attacks / Amir Moradi
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers / Jean-Sébastien Coron, David Naccache and Mehdi Tibouchi -- Fully Homomorphic Encryption with Polylog Overhead / Craig Gentry, Shai Halevi and Nigel P. Smart -- Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE / Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer and Vinod Vaikuntanathan, et al. -- Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers / Yuanmi Chen and Phong Q. Nguyen -- Decoding Random Binary Linear Codes in 2n/20: How 1+1=0 Improves Information Set Decoding / Anja Becker, Antoine Joux, Alexander May and Alexander Meurer -- Optimal Security Proofs for Full Domain Hash, Revisited / Saqib A. Kakvi and Eike Kiltz -- On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model / Yannick Seurin
Tightly-Secure Signatures from Lossy Identification Schemes / Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky and Mehdi Tibouchi -- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption / Tatsuaki Okamoto and Katsuyuki Takashima -- Scalable Group Signatures with Revocation / Benoît Libert, Thomas Peters and Moti Yung -- Incremental Deterministic Public-Key Encryption / Ilya Mironov, Omkant Pandey, Omer Reingold and Gil Segev -- Standard Security Does Not Imply Security against Selective-Opening / Mihir Bellare, Rafael Dowsley, Brent Waters and Scott Yilek -- Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security / Susan Hohenberger, Allison Lewko and Brent Waters -- Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation / Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson and Martijn Stam -- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / Daniele Micciancio and Chris Peikert -- Pseudorandom Functions and Lattices / Abhishek Banerjee, Chris Peikert and Alon Rosen -- Lattice Signatures without Trapdoors / Vadim Lyubashevsky
Summary Annotation This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices
Analysis Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Systems and Data Security
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
algoritmen
algorithms
computeranalyse
computer analysis
informatiesystemen
information systems
computerwetenschappen
computer sciences
wiskunde
mathematics
computernetwerken
computer networks
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography Includes bibliographical references and author index
In Springer eBooks
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer Security
Software
software.
Informatique.
Computer security
Data encryption (Computer science)
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Pointcheval, David.
Johansson, Thomas, 1967-
ISBN 9783642290114
3642290116
3642290108
9783642290107