:facetid:toc:\"db/conf/eurocrypt/eurocrypt2011.bht\"OK:facetid:toc:db/conf/eurocrypt/eurocrypt2011.bhtHadi AhmadiReihaneh Safavi-NainiSecret Keys from Channel Noise.EUROCRYPT266-2832011Conference and Workshop Papersopenconf/eurocrypt/AhmadiS1110.1007/978-3-642-20465-4_16https://doi.org/10.1007/978-3-642-20465-4_16https://dblp.org/rec/conf/eurocrypt/AhmadiS11URL#4644370Benny ApplebaumKey-Dependent Message Security: Generic Amplification and Completeness.EUROCRYPT527-5462011Conference and Workshop Papersopenconf/eurocrypt/Applebaum1110.1007/978-3-642-20465-4_29https://doi.org/10.1007/978-3-642-20465-4_29https://dblp.org/rec/conf/eurocrypt/Applebaum11URL#4644371Diego F. AranhaKoray KarabinaPatrick LongaCatherine H. GebotysJulio César López-HernándezFaster Explicit Formulas for Computing Pairings over Ordinary Curves.EUROCRYPT48-682011Conference and Workshop Papersopenconf/eurocrypt/AranhaKLGL1110.1007/978-3-642-20465-4_5https://doi.org/10.1007/978-3-642-20465-4_5https://dblp.org/rec/conf/eurocrypt/AranhaKLGL11URL#4644372Gilad AsharovRan CanettiCarmit HazayTowards a Game Theoretic View of Secure Computation.EUROCRYPT426-4452011Conference and Workshop Papersopenconf/eurocrypt/AsharovCH1110.1007/978-3-642-20465-4_24https://doi.org/10.1007/978-3-642-20465-4_24https://dblp.org/rec/conf/eurocrypt/AsharovCH11URL#4644373Anja Becker 0001Jean-Sébastien CoronAntoine JouxImproved Generic Algorithms for Hard Knapsacks.EUROCRYPT364-3852011Conference and Workshop Papersopenconf/eurocrypt/BeckerCJ1110.1007/978-3-642-20465-4_21https://doi.org/10.1007/978-3-642-20465-4_21https://dblp.org/rec/conf/eurocrypt/BeckerCJ11URL#4644374Rikke BendlinIvan DamgårdClaudio OrlandiSarah ZakariasSemi-homomorphic Encryption and Multiparty Computation.EUROCRYPT169-1882011Conference and Workshop Papersopenconf/eurocrypt/BendlinDOZ1110.1007/978-3-642-20465-4_11https://doi.org/10.1007/978-3-642-20465-4_11https://dblp.org/rec/conf/eurocrypt/BendlinDOZ11URL#4644375Dan BonehDavid Mandell FreemanHomomorphic Signatures for Polynomial Functions.EUROCRYPT149-1682011Conference and Workshop Papersopenconf/eurocrypt/BonehF1110.1007/978-3-642-20465-4_10https://doi.org/10.1007/978-3-642-20465-4_10https://dblp.org/rec/conf/eurocrypt/BonehF11URL#4644376Niek J. BoumanSerge FehrSecure Authentication from a Weak Key, without Leaking Information.EUROCRYPT246-2652011Conference and Workshop Papersopenconf/eurocrypt/BoumanF1110.1007/978-3-642-20465-4_15https://doi.org/10.1007/978-3-642-20465-4_15https://dblp.org/rec/conf/eurocrypt/BoumanF11URL#4644377Elette BoyleGil Segev 0001Daniel WichsFully Leakage-Resilient Signatures.EUROCRYPT89-1082011Conference and Workshop Papersopenconf/eurocrypt/BoyleSW1110.1007/978-3-642-20465-4_7https://doi.org/10.1007/978-3-642-20465-4_7https://dblp.org/rec/conf/eurocrypt/BoyleSW11URL#4644378Dario CatalanoDario Fiore 0001Bogdan WarinschiAdaptive Pseudo-free Groups and Applications.EUROCRYPT207-2232011Conference and Workshop Papersopenconf/eurocrypt/CatalanoFW1110.1007/978-3-642-20465-4_13https://doi.org/10.1007/978-3-642-20465-4_13https://dblp.org/rec/conf/eurocrypt/CatalanoFW11URL#4644379Ronald CramerThe Arithmetic Codex: Theory and Applications.EUROCRYPT12011Conference and Workshop Papersopenconf/eurocrypt/Cramer1110.1007/978-3-642-20465-4_1https://doi.org/10.1007/978-3-642-20465-4_1https://dblp.org/rec/conf/eurocrypt/Cramer11URL#4644380Yevgeniy DodisJohn P. SteinbergerDomain Extension for MACs Beyond the Birthday Barrier.EUROCRYPT323-3422011Conference and Workshop Papersopenconf/eurocrypt/DodisS1110.1007/978-3-642-20465-4_19https://doi.org/10.1007/978-3-642-20465-4_19https://dblp.org/rec/conf/eurocrypt/DodisS11URL#4644381Markus DürmuthDavid Mandell FreemanDeniable Encryption with Negligible Detection Probability: An Interactive Construction.EUROCRYPT610-6262011Conference and Workshop Papersopenconf/eurocrypt/DurmuthF1110.1007/978-3-642-20465-4_33https://doi.org/10.1007/978-3-642-20465-4_33https://dblp.org/rec/conf/eurocrypt/DurmuthF11URL#4644382Georg FuchsbauerCommuting Signatures and Verifiable Encryption.EUROCRYPT224-2452011Conference and Workshop Papersopenconf/eurocrypt/Fuchsbauer1110.1007/978-3-642-20465-4_14https://doi.org/10.1007/978-3-642-20465-4_14https://dblp.org/rec/conf/eurocrypt/Fuchsbauer11URL#4644383Craig GentryShai HaleviImplementing Gentry's Fully-Homomorphic Encryption Scheme.EUROCRYPT129-1482011Conference and Workshop Papersopenconf/eurocrypt/GentryH1110.1007/978-3-642-20465-4_9https://doi.org/10.1007/978-3-642-20465-4_9https://dblp.org/rec/conf/eurocrypt/GentryH11URL#4644384Yuval IshaiEyal KushilevitzRafail OstrovskyManoj PrabhakaranAmit SahaiEfficient Non-interactive Secure Computation.EUROCRYPT406-4252011Conference and Workshop Papersopenconf/eurocrypt/IshaiKOPS1110.1007/978-3-642-20465-4_23https://doi.org/10.1007/978-3-642-20465-4_23https://dblp.org/rec/conf/eurocrypt/IshaiKOPS11URL#4644385Eike KiltzKrzysztof PietrzakDavid CashAbhishek Jain 0002Daniele Venturi 0001Efficient Authentication from Hard Learning Problems.EUROCRYPT7-262011Conference and Workshop Papersopenconf/eurocrypt/KiltzPCJV1110.1007/978-3-642-20465-4_3https://doi.org/10.1007/978-3-642-20465-4_3https://dblp.org/rec/conf/eurocrypt/KiltzPCJV11URL#4644386Gregor LeanderOn Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN.EUROCRYPT303-3222011Conference and Workshop Papersopenconf/eurocrypt/Leander1110.1007/978-3-642-20465-4_18https://doi.org/10.1007/978-3-642-20465-4_18https://dblp.org/rec/conf/eurocrypt/Leander11URL#4644387Allison B. LewkoBrent WatersUnbounded HIBE and Attribute-Based Encryption.EUROCRYPT547-5672011Conference and Workshop Papersopenconf/eurocrypt/LewkoW1110.1007/978-3-642-20465-4_30https://doi.org/10.1007/978-3-642-20465-4_30https://dblp.org/rec/conf/eurocrypt/LewkoW11URL#4644388Allison B. LewkoBrent WatersDecentralizing Attribute-Based Encryption.EUROCRYPT568-5882011Conference and Workshop Papersopenconf/eurocrypt/LewkoW11a10.1007/978-3-642-20465-4_31https://doi.org/10.1007/978-3-642-20465-4_31https://dblp.org/rec/conf/eurocrypt/LewkoW11aURL#4644389Yehuda LindellHighly-Efficient Universally-Composable Commitments Based on the DDH Assumption.EUROCRYPT446-4662011Conference and Workshop Papersopenconf/eurocrypt/Lindell1110.1007/978-3-642-20465-4_25https://doi.org/10.1007/978-3-642-20465-4_25https://dblp.org/rec/conf/eurocrypt/Lindell11URL#4644390Tal MalkinIsamu TeranishiMoti YungEfficient Circuit-Size Independent Public Key Encryption with KDM Security.EUROCRYPT507-5262011Conference and Workshop Papersopenconf/eurocrypt/MalkinTY1110.1007/978-3-642-20465-4_28https://doi.org/10.1007/978-3-642-20465-4_28https://dblp.org/rec/conf/eurocrypt/MalkinTY11URL#4644391Amir Moradi 0001Axel PoschmannSan LingChristof PaarHuaxiong WangPushing the Limits: A Very Compact and a Threshold Implementation of AES.EUROCRYPT69-882011Conference and Workshop Papersopenconf/eurocrypt/MoradiPLPW1110.1007/978-3-642-20465-4_6https://doi.org/10.1007/978-3-642-20465-4_6https://dblp.org/rec/conf/eurocrypt/MoradiPLPW11URL#4644392Phong Q. NguyenLattice Reduction Algorithms: Theory and Practice.EUROCRYPT2-62011Conference and Workshop Papersopenconf/eurocrypt/Nguyen1110.1007/978-3-642-20465-4_2https://doi.org/10.1007/978-3-642-20465-4_2https://dblp.org/rec/conf/eurocrypt/Nguyen11URL#4644393Satoshi ObanaAlmost Optimum t-Cheater Identifiable Secret Sharing Schemes.EUROCRYPT284-3022011Conference and Workshop Papersopenconf/eurocrypt/Obana1110.1007/978-3-642-20465-4_17https://doi.org/10.1007/978-3-642-20465-4_17https://dblp.org/rec/conf/eurocrypt/Obana11URL#4644394Mathieu RenauldFrançois-Xavier StandaertNicolas Veyrat-CharvillonDina KamelDenis FlandreA Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices.EUROCRYPT109-1282011Conference and Workshop Papersopenconf/eurocrypt/RenauldSVKF1110.1007/978-3-642-20465-4_8https://doi.org/10.1007/978-3-642-20465-4_8https://dblp.org/rec/conf/eurocrypt/RenauldSVKF11URL#4644395Thomas RistenpartHovav ShachamThomas ShrimptonCareful with Composition: Limitations of the Indifferentiability Framework.EUROCRYPT487-5062011Conference and Workshop Papersopenconf/eurocrypt/RistenpartSS1110.1007/978-3-642-20465-4_27https://doi.org/10.1007/978-3-642-20465-4_27https://dblp.org/rec/conf/eurocrypt/RistenpartSS11URL#4644396Sven SchägeTight Proofs for Signature Schemes without Random Oracles.EUROCRYPT189-2062011Conference and Workshop Papersopenconf/eurocrypt/Schage1110.1007/978-3-642-20465-4_12https://doi.org/10.1007/978-3-642-20465-4_12https://dblp.org/rec/conf/eurocrypt/Schage11URL#4644397Pouyan SepehrdadSerge VaudenayMartin VuagnouxStatistical Attack on RC4 - Distinguishing WPA.EUROCRYPT343-3632011Conference and Workshop Papersopenconf/eurocrypt/SepehrdadVV1110.1007/978-3-642-20465-4_20https://doi.org/10.1007/978-3-642-20465-4_20https://dblp.org/rec/conf/eurocrypt/SepehrdadVV11URL#4644398Abhi ShelatChih-Hao ShenTwo-Output Secure Computation with Malicious Adversaries.EUROCRYPT386-4052011Conference and Workshop Papersopenconf/eurocrypt/ShelatS1110.1007/978-3-642-20465-4_22https://doi.org/10.1007/978-3-642-20465-4_22https://dblp.org/rec/conf/eurocrypt/ShelatS11URL#4644399Damien StehléRon SteinfeldMaking NTRU as Secure as Worst-Case Problems over Ideal Lattices.EUROCRYPT27-472011Conference and Workshop Papersopenconf/eurocrypt/StehleS1110.1007/978-3-642-20465-4_4https://doi.org/10.1007/978-3-642-20465-4_4https://dblp.org/rec/conf/eurocrypt/StehleS11URL#4644400Dominique UnruhConcurrent Composition in the Bounded Quantum Storage Model.EUROCRYPT467-4862011Conference and Workshop Papersopenconf/eurocrypt/Unruh1110.1007/978-3-642-20465-4_26https://doi.org/10.1007/978-3-642-20465-4_26https://dblp.org/rec/conf/eurocrypt/Unruh11URL#4644401Hoeteck WeeThreshold and Revocation Cryptosystems via Extractable Hash Proofs.EUROCRYPT589-6092011Conference and Workshop Papersopenconf/eurocrypt/Wee1110.1007/978-3-642-20465-4_32https://doi.org/10.1007/978-3-642-20465-4_32https://dblp.org/rec/conf/eurocrypt/Wee11URL#4644402Kenneth G. PatersonAdvances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. ProceedingsEUROCRYPTLecture Notes in Computer Science6632Springer2011Editorshipconf/eurocrypt/201110.1007/978-3-642-20465-4https://doi.org/10.1007/978-3-642-20465-4https://dblp.org/rec/conf/eurocrypt/2011URL#4744328