Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Advances in Cryptology -- CRYP...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Advances in Cryptology -- CRYPTO 2010 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings / edited by Tal Rabin.
Saved in:
Bibliographic Details
Corporate Author:
SpringerLink (Online service)
Other Authors:
Rabin, Tal
(Editor)
Format:
eBook
Language:
English
Published:
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
Edition:
1st ed. 2010.
Series:
Security and Cryptology ;
6223
Springer eBook Collection.
Subjects:
Data encryption (Computer science).
Management information systems.
Computer science.
Computer communication systems.
Computer security.
Computers and civilization.
Computer science—Mathematics.
Electronic resources (E-books)
Online Access:
Click to view e-book
Holy Cross Note:
Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Holdings
Description
Table of Contents
Similar Items
Staff View
Table of Contents:
Leakage
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
Protecting Cryptographic Keys against Continual Leakage
Securing Computation against Continuous Leakage
Lattice
An Efficient and Parallel Gaussian Sampler for Lattices
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
Homomorphic Encryption
Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness
Additively Homomorphic Encryption with d-Operand Multiplications
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Theory and Applications
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
Structure-Preserving Signatures and Commitments to Group Elements
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
Key Exchange, OAEP/RSA, CCA
Credential Authenticated Identification and Key Exchange
Password-Authenticated Session-Key Generation on the Internet in the Plain Model
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
Attacks
Factorization of a 768-Bit RSA Modulus
Correcting Errors in RSA Private Keys
Improved Differential Attacks for ECHO and Grøstl
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
Composition
Universally Composable Incoercibility
Concurrent Non-Malleable Zero Knowledge Proofs
Equivalence of Uniform Key Agreement and Composition Insecurity
Computation Delegation and Obfuscation
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
Improved Delegation of Computation Using Fully Homomorphic Encryption
Oblivious RAM Revisited
On Strong Simulation and Composable Point Obfuscation
Multiparty Computation
Protocols for Multiparty Coin Toss with Dishonest Majority
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Secure Multiparty Computation with Minimal Interaction
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security
Pseudorandomness
On Generalized Feistel Networks
Cryptographic Extraction and Key Derivation: The HKDF Scheme
Time Space Tradeoffs for Attacks against One-Way Functions and PRGs
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
Quantum
Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Sampling in a Quantum Population, and Applications.
Similar Items
Advances in Cryptology -- CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings
Published: (2012)
Advances in Cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings
Published: (2007)
Advances in Cryptology -- CRYPTO 2011 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011, Proceedings
Published: (2011)
Advances in Cryptology - CRYPTO 2008 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, Proceedings
Published: (2008)
Advances in Cryptology – CRYPTO 2017 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part I
Published: (2017)