Skip to main content
  • Conference proceedings
  • © 2010

Advances in Cryptology -- CRYPTO 2010

30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings

Editors:

  • Up-to-date research in cryptology

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6223)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (39 papers)

  1. Front Matter

  2. Leakage

    1. Protecting Cryptographic Keys against Continual Leakage

      • Ali Juma, Yevgeniy Vahlis
      Pages 41-58
    2. Securing Computation against Continuous Leakage

      • Shafi Goldwasser, Guy N. Rothblum
      Pages 59-79
  3. Homomorphic Encryption

    1. Additively Homomorphic Encryption with d-Operand Multiplications

      • Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz
      Pages 138-154
    2. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits

      • Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
      Pages 155-172
  4. Theory and Applications

    1. Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography

      • Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai
      Pages 173-190
    2. Structure-Preserving Signatures and Commitments to Group Elements

      • Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo
      Pages 209-236
    3. Efficient Indifferentiable Hashing into Ordinary Elliptic Curves

      • Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi
      Pages 237-254
  5. Key Exchange, OAEP/RSA, CCA

    1. Credential Authenticated Identification and Key Exchange

      • Jan Camenisch, Nathalie Casati, Thomas Gross, Victor Shoup
      Pages 255-276
    2. Password-Authenticated Session-Key Generation on the Internet in the Plain Model

      • Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
      Pages 277-294
    3. Instantiability of RSA-OAEP under Chosen-Plaintext Attack

      • Eike Kiltz, Adam O’Neill, Adam Smith
      Pages 295-313
  6. Attacks

    1. Factorization of a 768-Bit RSA Modulus

      • Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos et al.
      Pages 333-350
    2. Correcting Errors in RSA Private Keys

      • Wilko Henecka, Alexander May, Alexander Meurer
      Pages 351-369

Other Volumes

  1. Advances in Cryptology – CRYPTO 2010

Editors and Affiliations

  • IBM T.J.Watson Research Center, Hawthorne, USA

    Tal Rabin

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access