Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
Conference International Workshop on Practice and Theory in Public Key Cryptography (13th : 2010 : Paris, France)
Title Public key cryptography--PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings / Phong Q. Nguyen, David Pointcheval (eds.).
Imprint Berlin ; New York : Springer, 2010.

View online
View online
Conference International Workshop on Practice and Theory in Public Key Cryptography (13th : 2010 : Paris, France)
Series Lecture notes in computer science, 0302-9743 ; 6056
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6056. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Subject Computer security -- Congresses.
Computers -- Access control -- Congresses.
Data encryption (Computer science) -- Congresses.
Public key cryptography -- Congresses.
Computer Security.
Alt Name Nguyen, Phong Q. (Phong Quang)
Pointcheval, David.
International Association for Cryptologic Research.
Add Title PKC 2010
Description 1 online resource (xiii, 517 pages) : illustrations.
polychrome rdacc
Note Copyright International Association for Cryptologic Research.
Bibliography Note Includes bibliographical references and index.
Contents Encryption I. Simple and efficient public-key encryption from computational Diffie-Hellman in the standard model / Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, and Victor Shoup -- Constant size ciphertexts in threshold attribute-based encryption / Javier Herranz, Fabien Laguillaumie, and Carla Rafols -- Cryptanalysis. Algebraic cryptanalysis of the PKC'2009 algebraic surface cryptosystem / Jean-Charles Faugere and Pierre-Jean Spaenlehauer -- Maximizing small root bounds by linearization and applications to small secret exponent RSA / Mathias Herrmann and Alexander May -- Implicit factoring with shared most significant and middle bits / Jean-Charles Faugere, Raphael Marinier, and Guenael Renault -- Protocols I. On the feasibility of consistent computations / Sven Laur and Helger Lipmaa -- Multi-query computationally-private information retrieval with constant communication rate / Jens Groth, Aggelos Kiayias, and Helger Lipmaa -- Further observations on optimistic fair exchange protocols in the multi-user setting / Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang -- Network coding. Secure network coding over the integers / Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, and Tal Rabin -- Preventing pollution attacks in multi-source network coding / Shweta Agrawal, Dan Boneh, Xavier Boyen, and David Mandell Freeman -- Groth-Sahai proofs revisited / Essam Ghadafi, Nigel P. Smart, and Bogdan Warinschi -- Constant-round concurrent non-malleable statistically binding commitments and decommitments / Zhenfu Cao, Ivan Visconti, and Zongyang Zhang -- Elliptic curves. Faster squaring in the cyclotomic subgroup of sixth degree extensions / Robert Granger and Michael Scott -- Faster pairing computations on curves with high-degree twists / Craig Costello, Tanja Lange, and Michael Naehrig -- Efficient arithmetic on Hessian curves / Reza R. Farashahi and Marc Joye -- Lossy trapdoor functions. CCA proxy re-encryption without bilinear maps in the standard model / Toshihide Matsuda, Ryo Nishimaki, and Keisuke Tanaka -- More constructions of lossy and correlation-secure trapdoor functions / David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, and Gil Segev -- Chosen-ciphertext security from slightly lossy trapdoor functions / Petros Mol and Scott Yilek -- Protocols II. Efficient set operations in the presence of malicious adversaries / Carmit Hazay and Kobbi Nissim -- Text search protocols with simulation based security / Rosario Gennaro, Carmit Hazay, and Jeffrey S. Sorensen -- Discrete logarithm. Solving a 676-bit discrete logarithm problem in GF(3⁶n) / Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, and Tsuyoshi Takagi -- Using equivalence classes to accelerate solving the discrete logarithm problem in a short interval / Steven D. Galbraith and Raminder S. Ruprai -- Encryption II. Functional encryption for inner product : achieving constant-size ciphertexts with adaptive security or support for negation / Nuttapong Attrapadung and Benoit Libert -- Security of encryption schemes in weakened random oracle models (extended abstract) / Akinori Kawachi, Akira Numayama, Keisuke Tanaka, and Keita Xagawa -- Fully homomorphic encryption with relatively small key and ciphertext sizes / Nigel P. Smart and Frederik Vercauteren -- Signatures. Unlinkability of sanitizable signatures / Christina Brzuska, Marc Fischlin, Anja Lehmann, and Dominique Schroder -- Confidential signatures and deterministic signcryption / Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, and Dominique Schroder -- Identity-based aggregate and multi-signature schemes based on RSA / Ali Bagherzandi and Stanislaw Jarecki -- Lattice mixing and vanishing trapdoors : a framework for fully secure short signatures and more / Xavier Boyen.
Summary Annotation This book constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, PKC 2010, held in Paris, France, in May 2010. The 29 revised full papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on encryption; cryptanalysis; protocols; network coding; tools; elliptic curves; lossy trapdoor functions; discrete logarithm; and signatures.
Note Print version record.
ISBN 9783642130137
9783642130120 (pbk.)
3642130127 (pbk.)
ISBN/ISSN 10.1007/978-3-642-13013-7
OCLC # 663096307
Additional Format Print version: International Workshop on Practice and Theory in Public Key Cryptography (13th : 2010 : Paris, France). Public key cryptography - PKC 2010. Berlin ; New York : Springer, 2010 9783642130120 (DLC) 2010926287 (OCoLC)635376232

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team