Advances in Cryptology – EUROCRYPT 2011

30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings

  • Kenneth G. Paterson
Conference proceedings EUROCRYPT 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6632)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Lattice-Based Cryptography

    1. Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi
      Pages 7-26
    2. Damien Stehlé, Ron Steinfeld
      Pages 27-47
  4. Implementation and Side Channels

    1. Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López
      Pages 48-68
    2. Amir Moradi, Axel Poschmann, San Ling, Christof Paar, Huaxiong Wang
      Pages 69-88
    3. Elette Boyle, Gil Segev, Daniel Wichs
      Pages 89-108
    4. Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Dina Kamel, Denis Flandre
      Pages 109-128
  5. Homomorphic Cryptography

    1. Craig Gentry, Shai Halevi
      Pages 129-148
    2. Dan Boneh, David Mandell Freeman
      Pages 149-168
    3. Rikke Bendlin, Ivan Damgård, Claudio Orlandi, Sarah Zakarias
      Pages 169-188
  6. Signature Schemes

    1. Dario Catalano, Dario Fiore, Bogdan Warinschi
      Pages 207-223
    2. Georg Fuchsbauer
      Pages 224-245
  7. Information-Theoretic Cryptography

    1. Hadi Ahmadi, Reihaneh Safavi-Naini
      Pages 266-283
  8. Symmetric Key Cryptography

  9. Attacks and Algorithms

    1. Pouyan Sepehrdad, Serge Vaudenay, Martin Vuagnoux
      Pages 343-363
    2. Anja Becker, Jean-Sébastien Coron, Antoine Joux
      Pages 364-385
  10. Secure Computation

    1. Abhi shelat, Chih-hao Shen
      Pages 386-405
    2. Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai
      Pages 406-425
    3. Gilad Asharov, Ran Canetti, Carmit Hazay
      Pages 426-445
  11. Composability

    1. Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton
      Pages 487-506
  12. Key Dependent Message Security

  13. Public Key Encryption

  14. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011.
The 31 papers, presented together with 2 invited talks, were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on lattice-base cryptography, implementation and side channels, homomorphic cryptography, signature schemes, information-theoretic cryptography, symmetric key cryptography, attacks and algorithms, secure computation, composability, key dependent message security, and public key encryption.


authentication cryptanalysis cryptography multi-party computation oblivious transfer

Editors and affiliations

  • Kenneth G. Paterson
    • 1
  1. 1.Information Security Group (ISG)University of LondonEghamUK

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-20464-7
  • Online ISBN 978-3-642-20465-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software