Limit search to available items
Book Cover
E-book
Author Cryptographers' Track at RSA Conference (2013 : San Francisco, Calif.)

Title Topics in cryptology-- CT-RSA 2013 : the Cryptographers' track at the RSA Conference 2013, San Francisco, CA, USA, February 25-March 1, 2013. Proceedings / Ed Dawson (ed.)
Published Berlin ; New York : Springer, ©2013

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7779
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7779.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Side Channel Attacks I -- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations / Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Justine Wild -- Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL / Cyril Arnaud, Pierre-Alain Fouque -- Digital Signatures I -- Fair Exchange of Short Signatures without Trusted Third Party / Philippe Camacho -- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures / Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling -- Public-Key Encryption I -- A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption / Yannick Seurin, Joana Treger -- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks / Shengli Liu, Jian Weng, Yunlei Zhao -- Cryptographic Protocols I -- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes / Eduarda S.V. Freire, Kenneth G. Paterson, Bertram Poettering -- Randomized Partial Checking Revisited / Shahram Khazaei, Douglas Wikström
Secure Implementation Methods -- Randomly Failed! The State of Randomness in Current Java Implementations / Kai Michaelis, Christopher Meyer, Jörg Schwenk -- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl / Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe -- Symmetric Key Primitives I -- Collisions for the WIDEA-8 Compression Function / Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varıcı -- Finding Collisions for Round-Reduced SM3 / Florian Mendel, Tomislav Nad, Martin Schläffer -- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures / Stanislav Bulygin, Michael Walter, Johannes Buchmann -- Side Channel Attacks II -- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag / Thomas Korak, Thomas Plos -- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness / Yu Yu, François-Xavier Standaert -- Cryptographic Protocols II -- Cryptanalytic Attacks on MIFARE Classic Protocol / Jovan Dj. Golić
Asynchronous Computational VSS with Reduced Communication Complexity / Michael Backes, Amit Datta, Aniket Kate -- Public-Key Encryption II -- Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 / Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka -- Solving BDD by Enumeration: An Update / Mingjie Liu, Phong Q. Nguyen -- Identity-Based Encryption -- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions / Karyn Benson, Hovav Shacham, Brent Waters -- Accountable Authority Identity-Based Encryption with Public Traceability / Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng -- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption / Jae Hong Seo, Keita Emura -- Symmetric Key Primitives II -- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users / Mike Bond, George French, Nigel P. Smart, Gaven J. Watson -- A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy / Michal Hojsík, Veronika Půlpánová -- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis / Jiqiang Lu, Wun-She Yap, Yongzhuang Wei
Summary This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption
Analysis Computer science
Computer Communication Networks
Operating systems (Computers)
Data protection
Data encryption (Computer science)
Coding theory
Systems and Data Security
e-Commerce/e-business
Coding and Information Theory
Notes International conference proceedings
Includes author index
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks.
Computer security.
Computer Communication Networks
Computer Security
Computer networks
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Dawson, Ed (Edward)
ISBN 9783642360954
3642360955
Other Titles CT-RSA 2013