Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of eurocrypt 2011
Page
Title
1
The Arithmetic Codex: Theory and Applications
2
Lattice Reduction Algorithms: Theory and Practice
7
Efficient Authentication from Hard Learning Problems
27
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices
48
Faster Explicit Formulas for Computing Pairings over Ordinary Curves
69
Pushing the Limits: A Very Compact and a Threshold Implementation of AES
89
Fully Leakage-Resilient Signatures
109
A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
129
Implementing Gentry's Fully-Homomorphic Encryption Scheme
149
Homomorphic Signatures for Polynomial Functions
169
Semi-Homomorphic Encryption and Multiparty Computation
189
Tight Proofs for Signature Schemes without Random Oracles
207
Adaptive Pseudo-Free Groups and Applications
224
Commuting Signatures and Verifiable Encryptio
246
Secure Authentication from a Weak Key, Without Leaking Information
266
Secret Keys from Channel Noise
284
Almost Optimum t-Cheater Identifiable Secret Sharing Schemes
303
On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN
323
Domain Extension for MACs Beyond the Birthday Barrier
343
Statistical Attack on RC4
364
Improved Generic Algorithms for Hard Knapsacks
386
Two-output Secure Computation With Malicious Adversaries
406
Effcient Non-Interactive Secure Computation
426
Towards a Game Theoretic View of Secure Computation
446
Highly-Efficient Universally-Composable Commitments based on the DDH Assumption
467
Concurrent composition in the bounded quantum storage model
487
Careful with Composition: Limitations of the Indifferentiability Framework
507
Efficient Circuit-Size Independent Public Key Encryption with KDM Security
527
Key-Dependent Message Security: Generic Ampli¯cation and Completenes
547
Unbounded HIBE and Attribute-Based Encryption
568
Decentralizing Attribute-Based Encryption
589
Threshold and Revocation Cryptosystems via Extractable Hash Proofs
610
Deniable Encryption with Negligible Detection Probability: An Interactive Construction