Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/crypto/crypto2010.bht:"
@inproceedings{DBLP:conf/crypto/AbeFGHO10, author = {Masayuki Abe and Georg Fuchsbauer and Jens Groth and Kristiyan Haralambiev and Miyako Ohkubo}, editor = {Tal Rabin}, title = {Structure-Preserving Signatures and Commitments to Group Elements}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {209--236}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_12}, doi = {10.1007/978-3-642-14623-7\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbeFGHO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalBB10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen}, editor = {Tal Rabin}, title = {Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical {IBE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {98--115}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_6}, doi = {10.1007/978-3-642-14623-7\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeimelOO10, author = {Amos Beimel and Eran Omri and Ilan Orlov}, editor = {Tal Rabin}, title = {Protocols for Multiparty Coin Toss with Dishonest Majority}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {538--557}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_29}, doi = {10.1007/978-3-642-14623-7\_29}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeimelOO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareC10, author = {Mihir Bellare and David Cash}, editor = {Tal Rabin}, title = {Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {666--684}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_36}, doi = {10.1007/978-3-642-14623-7\_36}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyC10, author = {Nir Bitansky and Ran Canetti}, editor = {Tal Rabin}, title = {On Strong Simulation and Composable Point Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {520--537}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_28}, doi = {10.1007/978-3-642-14623-7\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoumanF10, author = {Niek J. Bouman and Serge Fehr}, editor = {Tal Rabin}, title = {Sampling in a Quantum Population, and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {724--741}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_39}, doi = {10.1007/978-3-642-14623-7\_39}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoumanF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrakerskiG10, author = {Zvika Brakerski and Shafi Goldwasser}, editor = {Tal Rabin}, title = {Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back)}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {1--20}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_1}, doi = {10.1007/978-3-642-14623-7\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrierCIMRT10, author = {Eric Brier and Jean{-}S{\'{e}}bastien Coron and Thomas Icart and David Madore and Hugues Randriam and Mehdi Tibouchi}, editor = {Tal Rabin}, title = {Efficient Indifferentiable Hashing into Ordinary Elliptic Curves}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {237--254}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_13}, doi = {10.1007/978-3-642-14623-7\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrierCIMRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CamenischCGS10, author = {Jan Camenisch and Nathalie Casati and Thomas Gross and Victor Shoup}, editor = {Tal Rabin}, title = {Credential Authenticated Identification and Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {255--276}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_14}, doi = {10.1007/978-3-642-14623-7\_14}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CamenischCGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChoLO10, author = {Chongwon Cho and Chen{-}Kuei Lee and Rafail Ostrovsky}, editor = {Tal Rabin}, title = {Equivalence of Uniform Key Agreement and Composition Insecurity}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {447--464}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_24}, doi = {10.1007/978-3-642-14623-7\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChoLO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChungKV10, author = {Kai{-}Min Chung and Yael Tauman Kalai and Salil P. Vadhan}, editor = {Tal Rabin}, title = {Improved Delegation of Computation Using Fully Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {483--501}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_26}, doi = {10.1007/978-3-642-14623-7\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChungKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardO10, author = {Ivan Damg{\aa}rd and Claudio Orlandi}, editor = {Tal Rabin}, title = {Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {558--576}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_30}, doi = {10.1007/978-3-642-14623-7\_30}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DamgardO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DeTT10, author = {Anindya De and Luca Trevisan and Madhur Tulsiani}, editor = {Tal Rabin}, title = {Time Space Tradeoffs for Attacks against One-Way Functions and PRGs}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {649--665}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_35}, doi = {10.1007/978-3-642-14623-7\_35}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DeTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisP10, author = {Yevgeniy Dodis and Krzysztof Pietrzak}, editor = {Tal Rabin}, title = {Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {21--40}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_2}, doi = {10.1007/978-3-642-14623-7\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DunkelmanKS10, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Tal Rabin}, title = {A Practical-Time Related-Key Attack on the {KASUMI} Cryptosystem Used in {GSM} and 3G Telephony}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {393--410}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_21}, doi = {10.1007/978-3-642-14623-7\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DunkelmanKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DupuisNS10, author = {Fr{\'{e}}d{\'{e}}ric Dupuis and Jesper Buus Nielsen and Louis Salvail}, editor = {Tal Rabin}, title = {Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {685--706}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_37}, doi = {10.1007/978-3-642-14623-7\_37}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DupuisNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GennaroGP10, author = {Rosario Gennaro and Craig Gentry and Bryan Parno}, editor = {Tal Rabin}, title = {Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {465--482}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_25}, doi = {10.1007/978-3-642-14623-7\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GennaroGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Gentry10, author = {Craig Gentry}, editor = {Tal Rabin}, title = {Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {116--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_7}, doi = {10.1007/978-3-642-14623-7\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Gentry10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryHV10, author = {Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, editor = {Tal Rabin}, title = {\emph{i}-Hop Homomorphic Encryption and Rerandomizable Yao Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {155--172}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_9}, doi = {10.1007/978-3-642-14623-7\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryHV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldwasserR10, author = {Shafi Goldwasser and Guy N. Rothblum}, editor = {Tal Rabin}, title = {Securing Computation against Continuous Leakage}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {59--79}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_4}, doi = {10.1007/978-3-642-14623-7\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldwasserR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalIMS10, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, editor = {Tal Rabin}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {173--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_10}, doi = {10.1007/978-3-642-14623-7\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoyalIMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalJO10, author = {Vipul Goyal and Abhishek Jain and Rafail Ostrovsky}, editor = {Tal Rabin}, title = {Password-Authenticated Session-Key Generation on the Internet in the Plain Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {277--294}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_15}, doi = {10.1007/978-3-642-14623-7\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalJO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HeneckaMM10, author = {Wilko Henecka and Alexander May and Alexander Meurer}, editor = {Tal Rabin}, title = {Correcting Errors in {RSA} Private Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {351--369}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_19}, doi = {10.1007/978-3-642-14623-7\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HeneckaMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoangR10, author = {Viet Tung Hoang and Phillip Rogaway}, editor = {Tal Rabin}, title = {On Generalized Feistel Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {613--630}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_33}, doi = {10.1007/978-3-642-14623-7\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoangR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKP10, author = {Yuval Ishai and Eyal Kushilevitz and Anat Paskin}, editor = {Tal Rabin}, title = {Secure Multiparty Computation with Minimal Interaction}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {577--594}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_31}, doi = {10.1007/978-3-642-14623-7\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JumaV10, author = {Ali Juma and Yevgeniy Vahlis}, editor = {Tal Rabin}, title = {Protecting Cryptographic Keys against Continual Leakage}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {41--58}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_3}, doi = {10.1007/978-3-642-14623-7\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JumaV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiltzOS10, author = {Eike Kiltz and Adam O'Neill and Adam D. Smith}, editor = {Tal Rabin}, title = {Instantiability of {RSA-OAEP} under Chosen-Plaintext Attack}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {295--313}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_16}, doi = {10.1007/978-3-642-14623-7\_16}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiltzOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KleinjungAFLTBGKMORTZ10, author = {Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen K. Lenstra and Emmanuel Thom{\'{e}} and Joppe W. Bos and Pierrick Gaudry and Alexander Kruppa and Peter L. Montgomery and Dag Arne Osvik and Herman J. J. te Riele and Andrey Timofeev and Paul Zimmermann}, editor = {Tal Rabin}, title = {Factorization of a 768-Bit {RSA} Modulus}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {333--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_18}, doi = {10.1007/978-3-642-14623-7\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KleinjungAFLTBGKMORTZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Krawczyk10, author = {Hugo Krawczyk}, editor = {Tal Rabin}, title = {Cryptographic Extraction and Key Derivation: The {HKDF} Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {631--648}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_34}, doi = {10.1007/978-3-642-14623-7\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Krawczyk10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LinPTV10, author = {Huijia Lin and Rafael Pass and Wei{-}Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, editor = {Tal Rabin}, title = {Concurrent Non-Malleable Zero Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {429--446}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_23}, doi = {10.1007/978-3-642-14623-7\_23}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LinPTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MajiPR10, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, editor = {Tal Rabin}, title = {A Zero-One Law for Cryptographic Complexity with Respect to Computational {UC} Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {595--612}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_32}, doi = {10.1007/978-3-642-14623-7\_32}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MajiPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MelchorGH10, author = {Carlos Aguilar Melchor and Philippe Gaborit and Javier Herranz}, editor = {Tal Rabin}, title = {Additively Homomorphic Encryption with \emph{d}-Operand Multiplications}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {138--154}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_8}, doi = {10.1007/978-3-642-14623-7\_8}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MelchorGH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoT10, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Tal Rabin}, title = {Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {191--208}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_11}, doi = {10.1007/978-3-642-14623-7\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Peikert10, author = {Chris Peikert}, editor = {Tal Rabin}, title = {An Efficient and Parallel Gaussian Sampler for Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {80--97}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_5}, doi = {10.1007/978-3-642-14623-7\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Peikert10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Peyrin10, author = {Thomas Peyrin}, editor = {Tal Rabin}, title = {Improved Differential Attacks for {ECHO} and Gr{\o}stl}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {370--392}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_20}, doi = {10.1007/978-3-642-14623-7\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Peyrin10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PinkasR10, author = {Benny Pinkas and Tzachy Reinman}, editor = {Tal Rabin}, title = {Oblivious {RAM} Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {502--519}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_27}, doi = {10.1007/978-3-642-14623-7\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PinkasR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/UnruhM10, author = {Dominique Unruh and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Tal Rabin}, title = {Universally Composable Incoercibility}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {411--428}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_22}, doi = {10.1007/978-3-642-14623-7\_22}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/UnruhM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Wee10, author = {Hoeteck Wee}, editor = {Tal Rabin}, title = {Efficient Chosen-Ciphertext Security via Extractable Hash Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {314--332}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_17}, doi = {10.1007/978-3-642-14623-7\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Wee10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WinklerW10, author = {Severin Winkler and J{\"{u}}rg Wullschleger}, editor = {Tal Rabin}, title = {On the Efficiency of Classical and Quantum Oblivious Transfer Reductions}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {707--723}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_38}, doi = {10.1007/978-3-642-14623-7\_38}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WinklerW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2010, editor = {Tal Rabin}, title = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7}, doi = {10.1007/978-3-642-14623-7}, isbn = {978-3-642-14622-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.