Coverart for item
The Resource Public key cryptography--PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings, Phong Q. Nguyen, David Pointcheval (eds.), (electronic book)

Public key cryptography--PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings, Phong Q. Nguyen, David Pointcheval (eds.), (electronic book)

Label
Public key cryptography--PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings
Title
Public key cryptography--PKC 2010
Title remainder
13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings
Statement of responsibility
Phong Q. Nguyen, David Pointcheval (eds.)
Title variation
PKC 2010
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
Annotation
Member of
Cataloging source
GW5XE
Dewey number
005.82
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I567 2010
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2010
http://bibfra.me/vocab/lite/meetingName
International Workshop on Practice and Theory in Public Key Cryptography
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Nguyen, Phong Q.
  • Pointcheval, David
  • International Association for Cryptologic Research
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
6056
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • Data encryption (Computer science)
  • Public key cryptography
  • Paris <2010>
Summary expansion
This book constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, PKC 2010, held in Paris, France, in May 2010. The 29 revised full papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on encryption; cryptanalysis; protocols; network coding; tools; elliptic curves; lossy trapdoor functions; discrete logarithm; and signatures
Label
Public key cryptography--PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings, Phong Q. Nguyen, David Pointcheval (eds.), (electronic book)
Instantiates
Publication
Note
Copyright International Association for Cryptologic Research
Bibliography note
Includes bibliographical references and index
Color
multicolored
Contents
Encryption I. Simple and efficient public-key encryption from computational Diffie-Hellman in the standard model / Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, and Victor Shoup -- Constant size ciphertexts in threshold attribute-based encryption / Javier Herranz, Fabien Laguillaumie, and Carla Ràfols -- Cryptanalysis. Algebraic cryptanalysis of the PKC'2009 algebraic surface cryptosystem / Jean-Charles Faugère and Pierre-Jean Spaenlehauer -- Maximizing small root bounds by linearization and applications to small secret exponent RSA / Mathias Herrmann and Alexander May -- Implicit factoring with shared most significant and middle bits / Jean-Charles Faugère, Raphaël Marinier, and Guénaël Renault -- Protocols I. On the feasibility of consistent computations / Sven Laur and Helger Lipmaa -- Multi-query computationally-private information retrieval with constant communication rate / Jens Groth, Aggelos Kiayias, and Helger Lipmaa -- Further observations on optimistic fair exchange protocols in the multi-user setting / Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang -- Network coding. Secure network coding over the integers / Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, and Tal Rabin -- Preventing pollution attacks in multi-source network coding / Shweta Agrawal, Dan Boneh, Xavier Boyen, and David Mandell Freeman -- Groth-Sahai proofs revisited / Essam Ghadafi, Nigel P. Smart, and Bogdan Warinschi -- Constant-round concurrent non-malleable statistically binding commitments and decommitments / Zhenfu Cao, Ivan Visconti, and Zongyang Zhang -- Elliptic curves. Faster squaring in the cyclotomic subgroup of sixth degree extensions / Robert Granger and Michael Scott -- Faster pairing computations on curves with high-degree twists / Craig Costello, Tanja Lange, and Michael Naehrig -- Efficient arithmetic on Hessian curves / Reza R. Farashahi and Marc Joye -- Lossy trapdoor functions. CCA proxy re-encryption without bilinear maps in the standard model / Toshihide Matsuda, Ryo Nishimaki, and Keisuke Tanaka -- More constructions of lossy and correlation-secure trapdoor functions / David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, and Gil Segev -- Chosen-ciphertext security from slightly lossy trapdoor functions / Petros Mol and Scott Yilek -- Protocols II. Efficient set operations in the presence of malicious adversaries / Carmit Hazay and Kobbi Nissim -- Text search protocols with simulation based security / Rosario Gennaro, Carmit Hazay, and Jeffrey S. Sorensen -- Discrete logarithm. Solving a 676-bit discrete logarithm problem in GF(36n) / Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, and Tsuyoshi Takagi -- Using equivalence classes to accelerate solving the discrete logarithm problem in a short interval / Steven D. Galbraith and Raminder S. Ruprai -- Encryption II. Functional encryption for inner product : achieving constant-size ciphertexts with adaptive security or support for negation / Nuttapong Attrapadung and Benoît Libert -- Security of encryption schemes in weakened random oracle models (extended abstract) / Akinori Kawachi, Akira Numayama, Keisuke Tanaka, and Keita Xagawa -- Fully homomorphic encryption with relatively small key and ciphertext sizes / Nigel P. Smart and Frederik Vercauteren -- Signatures. Unlinkability of sanitizable signatures / Christina Brzuska, Marc Fischlin, Anja Lehmann, and Dominique Schröder -- Confidential signatures and deterministic signcryption / Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, and Dominique Schröder -- Identity-based aggregate and multi-signature schemes based on RSA / Ali Bagherzandi and Stanislaw Jarecki -- Lattice mixing and vanishing trapdoors : a framework for fully secure short signatures and more / Xavier Boyen
Control code
SPR663096307
Dimensions
unknown
Extent
1 online resource (xiii, 517 p.)
Form of item
online
Isbn
9783642130137
Other physical details
ill.
Specific material designation
remote
Label
Public key cryptography--PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings, Phong Q. Nguyen, David Pointcheval (eds.), (electronic book)
Publication
Note
Copyright International Association for Cryptologic Research
Bibliography note
Includes bibliographical references and index
Color
multicolored
Contents
Encryption I. Simple and efficient public-key encryption from computational Diffie-Hellman in the standard model / Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, and Victor Shoup -- Constant size ciphertexts in threshold attribute-based encryption / Javier Herranz, Fabien Laguillaumie, and Carla Ràfols -- Cryptanalysis. Algebraic cryptanalysis of the PKC'2009 algebraic surface cryptosystem / Jean-Charles Faugère and Pierre-Jean Spaenlehauer -- Maximizing small root bounds by linearization and applications to small secret exponent RSA / Mathias Herrmann and Alexander May -- Implicit factoring with shared most significant and middle bits / Jean-Charles Faugère, Raphaël Marinier, and Guénaël Renault -- Protocols I. On the feasibility of consistent computations / Sven Laur and Helger Lipmaa -- Multi-query computationally-private information retrieval with constant communication rate / Jens Groth, Aggelos Kiayias, and Helger Lipmaa -- Further observations on optimistic fair exchange protocols in the multi-user setting / Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang -- Network coding. Secure network coding over the integers / Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, and Tal Rabin -- Preventing pollution attacks in multi-source network coding / Shweta Agrawal, Dan Boneh, Xavier Boyen, and David Mandell Freeman -- Groth-Sahai proofs revisited / Essam Ghadafi, Nigel P. Smart, and Bogdan Warinschi -- Constant-round concurrent non-malleable statistically binding commitments and decommitments / Zhenfu Cao, Ivan Visconti, and Zongyang Zhang -- Elliptic curves. Faster squaring in the cyclotomic subgroup of sixth degree extensions / Robert Granger and Michael Scott -- Faster pairing computations on curves with high-degree twists / Craig Costello, Tanja Lange, and Michael Naehrig -- Efficient arithmetic on Hessian curves / Reza R. Farashahi and Marc Joye -- Lossy trapdoor functions. CCA proxy re-encryption without bilinear maps in the standard model / Toshihide Matsuda, Ryo Nishimaki, and Keisuke Tanaka -- More constructions of lossy and correlation-secure trapdoor functions / David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, and Gil Segev -- Chosen-ciphertext security from slightly lossy trapdoor functions / Petros Mol and Scott Yilek -- Protocols II. Efficient set operations in the presence of malicious adversaries / Carmit Hazay and Kobbi Nissim -- Text search protocols with simulation based security / Rosario Gennaro, Carmit Hazay, and Jeffrey S. Sorensen -- Discrete logarithm. Solving a 676-bit discrete logarithm problem in GF(36n) / Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, and Tsuyoshi Takagi -- Using equivalence classes to accelerate solving the discrete logarithm problem in a short interval / Steven D. Galbraith and Raminder S. Ruprai -- Encryption II. Functional encryption for inner product : achieving constant-size ciphertexts with adaptive security or support for negation / Nuttapong Attrapadung and Benoît Libert -- Security of encryption schemes in weakened random oracle models (extended abstract) / Akinori Kawachi, Akira Numayama, Keisuke Tanaka, and Keita Xagawa -- Fully homomorphic encryption with relatively small key and ciphertext sizes / Nigel P. Smart and Frederik Vercauteren -- Signatures. Unlinkability of sanitizable signatures / Christina Brzuska, Marc Fischlin, Anja Lehmann, and Dominique Schröder -- Confidential signatures and deterministic signcryption / Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, and Dominique Schröder -- Identity-based aggregate and multi-signature schemes based on RSA / Ali Bagherzandi and Stanislaw Jarecki -- Lattice mixing and vanishing trapdoors : a framework for fully secure short signatures and more / Xavier Boyen
Control code
SPR663096307
Dimensions
unknown
Extent
1 online resource (xiii, 517 p.)
Form of item
online
Isbn
9783642130137
Other physical details
ill.
Specific material designation
remote

Library Locations

Processing Feedback ...