Advances in Cryptology – EUROCRYPT 2010

29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010. Proceedings

  • Henri Gilbert
Conference proceedings EUROCRYPT 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6110)

Table of contents

  1. Front Matter
  2. Cryptosystems I

    1. Vadim Lyubashevsky, Chris Peikert, Oded Regev
      Pages 1-23
    2. Marten van Dijk, Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
      Pages 24-43
    3. Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters
      Pages 62-91
  3. Obfuscation and Side Channel Security

    1. Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs
      Pages 113-134
    2. Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan
      Pages 135-156
  4. 2-Party Protocols

    1. S. Dov Gordon, Jonathan Katz
      Pages 157-176
    2. Juan Garay, Clint Givens, Rafail Ostrovsky
      Pages 177-196
    3. Marc Fischlin, Dominique Schröder
      Pages 197-215
    4. Esther Hänggi, Renato Renner, Stefan Wolf
      Pages 216-234
  5. Cryptanalysis

    1. Nick Howgrave-Graham, Antoine Joux
      Pages 235-256
    2. Nicolas Gama, Phong Q. Nguyen, Oded Regev
      Pages 257-278
    3. Jean-Charles Faugère, Ayoub Otmani, Ludovic Perret, Jean-Pierre Tillich
      Pages 279-298
    4. Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir
      Pages 299-319
  6. IACR Distinguished Lecture

  7. Automated Tools and Formal Methods

  8. Models and Proofs

    1. Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
      Pages 381-402
    2. Tolga Acar, Mira Belenkiy, Mihir Bellare, David Cash
      Pages 403-422
    3. Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai
      Pages 423-444
  9. Multiparty Protocols

    1. Ivan Damgård, Yuval Ishai, Mikkel Krøigaard
      Pages 445-465
    2. Martin Hirt, Vassilis Zikas
      Pages 466-485
  10. Cryptosystems II

    1. Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
      Pages 506-522
    2. David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert
      Pages 523-552
    3. Shweta Agrawal, Dan Boneh, Xavier Boyen
      Pages 553-572
  11. Hash and MAC

    1. John Steinberger
      Pages 597-615
    2. Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, Hoeteck Wee
      Pages 616-637
  12. Foundational Primitives

    1. Susan Hohenberger, Brent Waters
      Pages 656-672
    2. Eike Kiltz, Payman Mohassel, Adam O’Neill
      Pages 673-692
  13. Back Matter

About these proceedings


These are the proceedings of Eurocrypt 2010, the 29th in the series of Eu- pean conferences on the Theory and Application of Cryptographic Techniques. The conference was sponsored by the International Association for Cryptologic Research and held on the French Riviera, May 30–June 3, 2010. A total of 191 papers were received of which 188 were retained as valid submissions. These were each assigned to at least three Program Committee members and a total of 606 review reports were produced. The printed record of the reviews and extensive online discussions that followed would be almost as voluminous as these proceedings. In the end 35 submissions were accepted with twosubmissionpairsbeingmergedtogive33paperspresentedattheconference. The ?nal papers in these proceedings were not subject to a second review before publication and the authors are responsible for their contents. The ProgramCommittee, listed on the next page, deservesparticular thanks for all their hard work, their outstanding expertise, and their constant c- mitment to all aspects of the evaluation process. These thanks are of course extended to the very many external reviewers who took the time to help out during the evaluation process.It was also a greatpleasure to honor and welcome Moti Yung who gave the 2010 IACR Distinguished Lecture.


AES Broadcast algebra algorithms complexity cryptoanalysis cryptography cryptology cryptosystems database digital signature encryption hash function information security security

Editors and affiliations

  • Henri Gilbert
    • 1
  1. 1.Orange Labs/MAPS/STTIssy les Moulineaux Cedex 9France

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-13189-9
  • Online ISBN 978-3-642-13190-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software