Last update: Sat Oct 14 16:20:43 MDT 2017
Volume 6632, 2011Anonymous Front Matter . . . . . . . . . . . . . . ?? Ronald Cramer The Arithmetic Codex: Theory and Applications . . . . . . . . . . . . . . 1--1 Phong Q. Nguyen Lattice Reduction Algorithms: Theory and Practice . . . . . . . . . . . . . . . . 2--6 Eike Kiltz and Krzysztof Pietrzak and David Cash and Abhishek Jain and Daniele Venturi Efficient Authentication from Hard Learning Problems . . . . . . . . . . . 7--26 Damien Stehlé and Ron Steinfeld Making NTRU as Secure as Worst-Case Problems over Ideal Lattices . . . . . . 27--47 Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio López Faster Explicit Formulas for Computing Pairings over Ordinary Curves . . . . . 48--68 Amir Moradi and Axel Poschmann and San Ling and Christof Paar and Huaxiong Wang Pushing the Limits: A Very Compact and a Threshold Implementation of AES . . . . 69--88 Elette Boyle and Gil Segev and Daniel Wichs Fully Leakage-Resilient Signatures . . . 89--108 Mathieu Renauld and François-Xavier Standaert and Nicolas Veyrat-Charvillon and Dina Kamel A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices . . . . . . . . . . . 109--128 Craig Gentry and Shai Halevi Implementing Gentry's Fully-Homomorphic Encryption Scheme . . . . . . . . . . . 129--148 Dan Boneh and David Mandell Freeman Homomorphic Signatures for Polynomial Functions . . . . . . . . . . . . . . . 149--168 Rikke Bendlin and Ivan Damgaård and Claudio Orlandi and Sarah Zakarias Semi-homomorphic Encryption and Multiparty Computation . . . . . . . . . 169--188 Sven Schäge Tight Proofs for Signature Schemes without Random Oracles . . . . . . . . . 189--206 Dario Catalano and Dario Fiore and Bogdan Warinschi Adaptive Pseudo-free Groups and Applications . . . . . . . . . . . . . . 207--223 Georg Fuchsbauer Commuting Signatures and Verifiable Encryption . . . . . . . . . . . . . . . 224--245 Niek J. Bouman and Serge Fehr Secure Authentication from a Weak Key, without Leaking Information . . . . . . 246--265 Hadi Ahmadi and Reihaneh Safavi-Naini Secret Keys from Channel Noise . . . . . 266--283 Satoshi Obana Almost Optimum $t$-Cheater Identifiable Secret Sharing Schemes . . . . . . . . . 284--302 Gregor Leander On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN . . . . . . . . . . . . . . . . . 303--322 Yevgeniy Dodis and John Steinberger Domain Extension for MACs Beyond the Birthday Barrier . . . . . . . . . . . . 323--342 Pouyan Sepehrdad and Serge Vaudenay and Martin Vuagnoux Statistical Attack on RC4 . . . . . . . 343--363 Anja Becker and Jean-Sébastien Coron and Antoine Joux Improved Generic Algorithms for Hard Knapsacks . . . . . . . . . . . . . . . 364--385 Abhi shelat and Chih-hao Shen Two-Output Secure Computation with Malicious Adversaries . . . . . . . . . 386--405 Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai Efficient Non-interactive Secure Computation . . . . . . . . . . . . . . 406--425 Gilad Asharov and Ran Canetti and Carmit Hazay Towards a Game Theoretic View of Secure Computation . . . . . . . . . . . . . . 426--445 Yehuda Lindell Highly-Efficient Universally-Composable Commitments Based on the DDH Assumption 446--466 Dominique Unruh Concurrent Composition in the Bounded Quantum Storage Model . . . . . . . . . 467--486 Thomas Ristenpart and Hovav Shacham and Thomas Shrimpton Careful with Composition: Limitations of the Indifferentiability Framework . . . 487--506 Tal Malkin and Isamu Teranishi and Moti Yung Efficient Circuit-Size Independent Public Key Encryption with KDM Security 507--526 Benny Applebaum Key-Dependent Message Security: Generic Amplification and Completeness . . . . . 527--546 Allison Lewko and Brent Waters Unbounded HIBE and Attribute-Based Encryption . . . . . . . . . . . . . . . 547--567 Allison Lewko and Brent Waters Decentralizing Attribute-Based Encryption . . . . . . . . . . . . . . . 568--588 Hoeteck Wee Threshold and Revocation Cryptosystems via Extractable Hash Proofs . . . . . . 589--609 Markus Dürmuth and David Mandell Freeman Deniable Encryption with Negligible Detection Probability: An Interactive Construction . . . . . . . . . . . . . . 610--626 Anonymous Back Matter . . . . . . . . . . . . . . ??
Hermann Kopetz What I Learned from Brian . . . . . . . 1--6 John L. Lloyd and Tom Anderson Brian Randell: a Biographical Note . . . 7--14 Algirdas Avi ienis On Building a Referee's Avatar . . . . . 15--22 Martin Campbell-Kelly From Theory to Practice: The Invention of Programming, 1947--51 . . . . . . . . 23--37 David Lomet Transactions: From Local Atomicity to Atomicity in the Cloud . . . . . . . . . 38--52 John Rushby From DSS to MILS . . . . . . . . . . . . 53--57 Doron Swade Pre-electronic Computing . . . . . . . . 58--83 Brian Wichmann Whetstone Wanderings . . . . . . . . . . 84--92 Jean Bacon and Andrei Iu. Bejan and Alastair R. Beresford and David Evans and Richard J. Gibbens Using Real-Time Road Traffic Data to Evaluate Congestion . . . . . . . . . . 93--117 Jean-Pierre Banâtre and Christine Morin and Thierry Priol Fault Tolerant Autonomic Computing Systems in a Chemical Setting . . . . . 118--129 Gordon Bell Out of a Closet: The Early Years of The Computer Museum . . . . . . . . . . . . 130--146 Alan Burns and Sanjoy Baruah Timing Faults and Mixed Criticality Systems . . . . . . . . . . . . . . . . 147--166 Paul E. Ceruzzi Professor Brian Randell and the History of Computing . . . . . . . . . . . . . . 167--173 Ed Coffman Computer Storage Fragmentation: Pioneering Work of Brian Randell . . . . 174--184 Lynn Conway IBM-ACS: Reminiscences and Lessons Learned from a 1960's Supercomputer Project . . . . . . . . . . . . . . . . 185--224 Pierre-Jacques Courtois The Belgian Electronic Mathematical Machine (1951--1962): an Account . . . . 225--237 Marc Dacier On the Resilience of the Dependability Framework to the Intrusion of New Security Threats . . . . . . . . . . . . 238--250 Peter J. Denning Virtual Fault Tolerance . . . . . . . . 251--260 Tony Hoare Recovery Blocks . . . . . . . . . . . . 261--266 J. J. Horning The Development and Writing of ``Process Structuring'' . . . . . . . . . . . . . 267--272