List of accepted papers to Crypto 2010 ====================================== Factorization of a 768-bit RSA modulus T. Kleinjung and K. Aoki and J. Franke and A. Lenstra and E. Thomé and J. Bos and P. Gaudry and A. Kruppa and P. Montgomery and D. Osvik and H. te Riele and A. Timofeev and P. Zimmermann Structure-Preserving Signatures and Commitments to Group Elements Masayuki ABE and Georg FUCHSBAUER and Jens GROTH and Kristiyan HARALAMBIEV and Miyako OHKUBO A Zero-One Law for Cryptographic Complexity with respect to Computational UC Security Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost Ivan Damgĺrd and Claudio Orlandi Oblivious RAM Revisited Benny Pinkas and Tzachy Reinman On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway On Strong simulation and Composable Point Obfuscation Nir Bitansky and Ran Canetti Efficient Indifferentiable Hashing into Ordinary Elliptic Curves Eric Brier and Jean-Sebastien Coron and Thomas Icart and David Madore and Hugues Randriam and Mehdi Tibouchi Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back) Zvika Brakerski and Shafi Goldwasser Improved Differential Attacks for ECHO and Grostl Thomas Peyrin Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai Equivalence of Uniform Key Agreement and Composition Insecurity Chongwon Cho and Chen-Kuei Lee and Rafail Ostrovsky A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony Orr Dunkelman and Nathan Keller and Adi Shamir Protecting Cryptographic Keys Against Continual Leakage Ali Juma and Yevgeniy Vahlis Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks Yevgeniy Dodis and Krzysztof Pietrzak Sampling in a Quantum Population, and Applications Niek Bouman and Serge Fehr Secure Two-Party Quantum Evaluation of Unitaries Against Specious Adversaries Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail Credential Authenticated Identification and Key Exchange Jan Camenisch and Nathalie Casati and Thomas Gross and Victor Shoup Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers Rosario Gennaro and Craig Gentry and Bryan Parno Time space tradeoffs for attacks against One-way functions and PRGs Anindya De and Luca Trevisan and Madhur Tulsiani Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks Mihir Bellare and David Cash An Efficient and Parallel Gaussian Sampler for Lattices Chris Peikert Concurrent Password-Authenticated Key Exchange in the Plain Model Vipul Goyal and Abhishek Jain and Rafail Ostrovsky Lossiness of RSA and the Instantiability of OAEP Eike Kiltz and Adam O'Neill and Adam Smith Universally Composable Incoercibility Dominique Unruh and Jörn Müller-Quade Additively Homomorphic Encryption with d-Operand Multiplications Carlos Aguilar and Philippe Gaborit and Javier Herranz Improved Delegation of Computation using Fully Homomorphic Encryption Kai-Min Chung and Yael Kalai and Salil Vadhan On the Efficiency of Classical and Quantum Oblivious Transfer Reductions Severin Winkler and Juerg Wullschleger Protocols for Multiparty Coin Toss With Dishonest Majority Amos Beimel and Eran Omri and Ilan Orlov Efficient Chosen-Ciphertext Security via Extractable Hash Proofs Hoeteck Wee Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption Tatsuaki Okamoto and Katsuyuki Takashima Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness Craig Gentry Secure Multiparty Computation with Minimal Interaction Yuval Ishai and Eyal Kushilevitz and Anat Paskin-Cherniavsky i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits Craig Gentry and Shai Halevi and Vinod Vaikuntanathan Correcting Errors in RSA Private Keys Wilko Henecka and Alexander May and Alexander Meurer Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE Shweta Agrawal and Dan Boneh and Xavier Boyen Concurrent Non-Malleable Zero Knowledge Proofs Huijia Lin and Rafael Pass and Wei-lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam Securing Computation Against Continuous Leakage Shafi Goldwasser and Guy Rothblum