Search dblp for Publications

export results for "toc:db/conf/crypto/crypto2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/crypto/AbeFGHO10,
  author       = {Masayuki Abe and
                  Georg Fuchsbauer and
                  Jens Groth and
                  Kristiyan Haralambiev and
                  Miyako Ohkubo},
  editor       = {Tal Rabin},
  title        = {Structure-Preserving Signatures and Commitments to Group Elements},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {209--236},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_12},
  doi          = {10.1007/978-3-642-14623-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbeFGHO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalBB10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen},
  editor       = {Tal Rabin},
  title        = {Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext
                  Hierarchical {IBE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {98--115},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_6},
  doi          = {10.1007/978-3-642-14623-7\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeimelOO10,
  author       = {Amos Beimel and
                  Eran Omri and
                  Ilan Orlov},
  editor       = {Tal Rabin},
  title        = {Protocols for Multiparty Coin Toss with Dishonest Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {538--557},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_29},
  doi          = {10.1007/978-3-642-14623-7\_29},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeimelOO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareC10,
  author       = {Mihir Bellare and
                  David Cash},
  editor       = {Tal Rabin},
  title        = {Pseudorandom Functions and Permutations Provably Secure against Related-Key
                  Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {666--684},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_36},
  doi          = {10.1007/978-3-642-14623-7\_36},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyC10,
  author       = {Nir Bitansky and
                  Ran Canetti},
  editor       = {Tal Rabin},
  title        = {On Strong Simulation and Composable Point Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {520--537},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_28},
  doi          = {10.1007/978-3-642-14623-7\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoumanF10,
  author       = {Niek J. Bouman and
                  Serge Fehr},
  editor       = {Tal Rabin},
  title        = {Sampling in a Quantum Population, and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {724--741},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_39},
  doi          = {10.1007/978-3-642-14623-7\_39},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoumanF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiG10,
  author       = {Zvika Brakerski and
                  Shafi Goldwasser},
  editor       = {Tal Rabin},
  title        = {Circular and Leakage Resilient Public-Key Encryption under Subgroup
                  Indistinguishability - (or: Quadratic Residuosity Strikes Back)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_1},
  doi          = {10.1007/978-3-642-14623-7\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrierCIMRT10,
  author       = {Eric Brier and
                  Jean{-}S{\'{e}}bastien Coron and
                  Thomas Icart and
                  David Madore and
                  Hugues Randriam and
                  Mehdi Tibouchi},
  editor       = {Tal Rabin},
  title        = {Efficient Indifferentiable Hashing into Ordinary Elliptic Curves},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {237--254},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_13},
  doi          = {10.1007/978-3-642-14623-7\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrierCIMRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischCGS10,
  author       = {Jan Camenisch and
                  Nathalie Casati and
                  Thomas Gross and
                  Victor Shoup},
  editor       = {Tal Rabin},
  title        = {Credential Authenticated Identification and Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {255--276},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_14},
  doi          = {10.1007/978-3-642-14623-7\_14},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CamenischCGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChoLO10,
  author       = {Chongwon Cho and
                  Chen{-}Kuei Lee and
                  Rafail Ostrovsky},
  editor       = {Tal Rabin},
  title        = {Equivalence of Uniform Key Agreement and Composition Insecurity},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {447--464},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_24},
  doi          = {10.1007/978-3-642-14623-7\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChoLO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChungKV10,
  author       = {Kai{-}Min Chung and
                  Yael Tauman Kalai and
                  Salil P. Vadhan},
  editor       = {Tal Rabin},
  title        = {Improved Delegation of Computation Using Fully Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {483--501},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_26},
  doi          = {10.1007/978-3-642-14623-7\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChungKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardO10,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  editor       = {Tal Rabin},
  title        = {Multiparty Computation for Dishonest Majority: From Passive to Active
                  Security at Low Cost},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {558--576},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_30},
  doi          = {10.1007/978-3-642-14623-7\_30},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DeTT10,
  author       = {Anindya De and
                  Luca Trevisan and
                  Madhur Tulsiani},
  editor       = {Tal Rabin},
  title        = {Time Space Tradeoffs for Attacks against One-Way Functions and PRGs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {649--665},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_35},
  doi          = {10.1007/978-3-642-14623-7\_35},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DeTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisP10,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak},
  editor       = {Tal Rabin},
  title        = {Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks
                  on Feistel Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_2},
  doi          = {10.1007/978-3-642-14623-7\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DunkelmanKS10,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Tal Rabin},
  title        = {A Practical-Time Related-Key Attack on the {KASUMI} Cryptosystem Used
                  in {GSM} and 3G Telephony},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {393--410},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_21},
  doi          = {10.1007/978-3-642-14623-7\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DunkelmanKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DupuisNS10,
  author       = {Fr{\'{e}}d{\'{e}}ric Dupuis and
                  Jesper Buus Nielsen and
                  Louis Salvail},
  editor       = {Tal Rabin},
  title        = {Secure Two-Party Quantum Evaluation of Unitaries against Specious
                  Adversaries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {685--706},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_37},
  doi          = {10.1007/978-3-642-14623-7\_37},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DupuisNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GennaroGP10,
  author       = {Rosario Gennaro and
                  Craig Gentry and
                  Bryan Parno},
  editor       = {Tal Rabin},
  title        = {Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted
                  Workers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {465--482},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_25},
  doi          = {10.1007/978-3-642-14623-7\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GennaroGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Gentry10,
  author       = {Craig Gentry},
  editor       = {Tal Rabin},
  title        = {Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {116--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_7},
  doi          = {10.1007/978-3-642-14623-7\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Gentry10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryHV10,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Vinod Vaikuntanathan},
  editor       = {Tal Rabin},
  title        = {\emph{i}-Hop Homomorphic Encryption and Rerandomizable Yao Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {155--172},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_9},
  doi          = {10.1007/978-3-642-14623-7\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryHV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserR10,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum},
  editor       = {Tal Rabin},
  title        = {Securing Computation against Continuous Leakage},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {59--79},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_4},
  doi          = {10.1007/978-3-642-14623-7\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldwasserR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalIMS10,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Mohammad Mahmoody and
                  Amit Sahai},
  editor       = {Tal Rabin},
  title        = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {173--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_10},
  doi          = {10.1007/978-3-642-14623-7\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalIMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalJO10,
  author       = {Vipul Goyal and
                  Abhishek Jain and
                  Rafail Ostrovsky},
  editor       = {Tal Rabin},
  title        = {Password-Authenticated Session-Key Generation on the Internet in the
                  Plain Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {277--294},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_15},
  doi          = {10.1007/978-3-642-14623-7\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalJO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HeneckaMM10,
  author       = {Wilko Henecka and
                  Alexander May and
                  Alexander Meurer},
  editor       = {Tal Rabin},
  title        = {Correcting Errors in {RSA} Private Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {351--369},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_19},
  doi          = {10.1007/978-3-642-14623-7\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HeneckaMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoangR10,
  author       = {Viet Tung Hoang and
                  Phillip Rogaway},
  editor       = {Tal Rabin},
  title        = {On Generalized Feistel Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {613--630},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_33},
  doi          = {10.1007/978-3-642-14623-7\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoangR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKP10,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Anat Paskin},
  editor       = {Tal Rabin},
  title        = {Secure Multiparty Computation with Minimal Interaction},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {577--594},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_31},
  doi          = {10.1007/978-3-642-14623-7\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JumaV10,
  author       = {Ali Juma and
                  Yevgeniy Vahlis},
  editor       = {Tal Rabin},
  title        = {Protecting Cryptographic Keys against Continual Leakage},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {41--58},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_3},
  doi          = {10.1007/978-3-642-14623-7\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JumaV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiltzOS10,
  author       = {Eike Kiltz and
                  Adam O'Neill and
                  Adam D. Smith},
  editor       = {Tal Rabin},
  title        = {Instantiability of {RSA-OAEP} under Chosen-Plaintext Attack},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {295--313},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_16},
  doi          = {10.1007/978-3-642-14623-7\_16},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiltzOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KleinjungAFLTBGKMORTZ10,
  author       = {Thorsten Kleinjung and
                  Kazumaro Aoki and
                  Jens Franke and
                  Arjen K. Lenstra and
                  Emmanuel Thom{\'{e}} and
                  Joppe W. Bos and
                  Pierrick Gaudry and
                  Alexander Kruppa and
                  Peter L. Montgomery and
                  Dag Arne Osvik and
                  Herman J. J. te Riele and
                  Andrey Timofeev and
                  Paul Zimmermann},
  editor       = {Tal Rabin},
  title        = {Factorization of a 768-Bit {RSA} Modulus},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {333--350},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_18},
  doi          = {10.1007/978-3-642-14623-7\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KleinjungAFLTBGKMORTZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Krawczyk10,
  author       = {Hugo Krawczyk},
  editor       = {Tal Rabin},
  title        = {Cryptographic Extraction and Key Derivation: The {HKDF} Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {631--648},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_34},
  doi          = {10.1007/978-3-642-14623-7\_34},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Krawczyk10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LinPTV10,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Wei{-}Lung Dustin Tseng and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Tal Rabin},
  title        = {Concurrent Non-Malleable Zero Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {429--446},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_23},
  doi          = {10.1007/978-3-642-14623-7\_23},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LinPTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MajiPR10,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Tal Rabin},
  title        = {A Zero-One Law for Cryptographic Complexity with Respect to Computational
                  {UC} Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {595--612},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_32},
  doi          = {10.1007/978-3-642-14623-7\_32},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MajiPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MelchorGH10,
  author       = {Carlos Aguilar Melchor and
                  Philippe Gaborit and
                  Javier Herranz},
  editor       = {Tal Rabin},
  title        = {Additively Homomorphic Encryption with \emph{d}-Operand Multiplications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {138--154},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_8},
  doi          = {10.1007/978-3-642-14623-7\_8},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MelchorGH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoT10,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Tal Rabin},
  title        = {Fully Secure Functional Encryption with General Relations from the
                  Decisional Linear Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {191--208},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_11},
  doi          = {10.1007/978-3-642-14623-7\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Peikert10,
  author       = {Chris Peikert},
  editor       = {Tal Rabin},
  title        = {An Efficient and Parallel Gaussian Sampler for Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {80--97},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_5},
  doi          = {10.1007/978-3-642-14623-7\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Peikert10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Peyrin10,
  author       = {Thomas Peyrin},
  editor       = {Tal Rabin},
  title        = {Improved Differential Attacks for {ECHO} and Gr{\o}stl},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {370--392},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_20},
  doi          = {10.1007/978-3-642-14623-7\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Peyrin10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PinkasR10,
  author       = {Benny Pinkas and
                  Tzachy Reinman},
  editor       = {Tal Rabin},
  title        = {Oblivious {RAM} Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {502--519},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_27},
  doi          = {10.1007/978-3-642-14623-7\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PinkasR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/UnruhM10,
  author       = {Dominique Unruh and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Tal Rabin},
  title        = {Universally Composable Incoercibility},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {411--428},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_22},
  doi          = {10.1007/978-3-642-14623-7\_22},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/UnruhM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Wee10,
  author       = {Hoeteck Wee},
  editor       = {Tal Rabin},
  title        = {Efficient Chosen-Ciphertext Security via Extractable Hash Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {314--332},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_17},
  doi          = {10.1007/978-3-642-14623-7\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Wee10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WinklerW10,
  author       = {Severin Winkler and
                  J{\"{u}}rg Wullschleger},
  editor       = {Tal Rabin},
  title        = {On the Efficiency of Classical and Quantum Oblivious Transfer Reductions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {707--723},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_38},
  doi          = {10.1007/978-3-642-14623-7\_38},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WinklerW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2010,
  editor       = {Tal Rabin},
  title        = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7},
  doi          = {10.1007/978-3-642-14623-7},
  isbn         = {978-3-642-14622-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics