Limit search to available items
Book Cover
Author Cryptographers' Track at RSA Conference (2013 : San Francisco, Calif.)

Title Topics in cryptology-- CT-RSA 2013 : the Cryptographers' track at the RSA Conference 2013, San Francisco, CA, USA, February 25-March 1, 2013. Proceedings / Ed Dawson (ed.)
Published Berlin ; New York : Springer, [2013]
Online access available from:
Springer eBooks    View Resource Record  


Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7779
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7779
LNCS sublibrary. SL 4, Security and cryptology.
Contents Side Channel Attacks I -- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations / Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Justine Wild -- Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL / Cyril Arnaud, Pierre-Alain Fouque -- Digital Signatures I -- Fair Exchange of Short Signatures without Trusted Third Party / Philippe Camacho -- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures / Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling -- Public-Key Encryption I -- A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption / Yannick Seurin, Joana Treger -- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks / Shengli Liu, Jian Weng, Yunlei Zhao -- Cryptographic Protocols I -- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes / Eduarda S.V. Freire, Kenneth G. Paterson, Bertram Poettering -- Randomized Partial Checking Revisited / Shahram Khazaei, Douglas Wikström
Secure Implementation Methods -- Randomly Failed! The State of Randomness in Current Java Implementations / Kai Michaelis, Christopher Meyer, Jörg Schwenk -- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl / Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe -- Symmetric Key Primitives I -- Collisions for the WIDEA-8 Compression Function / Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varıcı -- Finding Collisions for Round-Reduced SM3 / Florian Mendel, Tomislav Nad, Martin Schläffer -- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures / Stanislav Bulygin, Michael Walter, Johannes Buchmann -- Side Channel Attacks II -- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag / Thomas Korak, Thomas Plos -- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness / Yu Yu, François-Xavier Standaert -- Cryptographic Protocols II -- Cryptanalytic Attacks on MIFARE Classic Protocol / Jovan Dj. Golić
Asynchronous Computational VSS with Reduced Communication Complexity / Michael Backes, Amit Datta, Aniket Kate -- Public-Key Encryption II -- Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 / Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka -- Solving BDD by Enumeration: An Update / Mingjie Liu, Phong Q. Nguyen -- Identity-Based Encryption -- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions / Karyn Benson, Hovav Shacham, Brent Waters -- Accountable Authority Identity-Based Encryption with Public Traceability / Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng -- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption / Jae Hong Seo, Keita Emura -- Symmetric Key Primitives II -- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users / Mike Bond, George French, Nigel P. Smart, Gaven J. Watson -- A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy / Michal Hojsík, Veronika Půlpánová -- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis / Jiqiang Lu, Wun-She Yap, Yongzhuang Wei
Summary This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption
Analysis Computer science
Computer Communication Networks
Operating systems (Computers)
Data protection
Data encryption (Computer science)
Coding theory
Systems and Data Security
Coding and Information Theory
Notes International conference proceedings
Includes author index
Subject Data encryption (Computer science) -- Congresses.
Computer security -- Congresses.
Computer networks -- Security measures -- Congresses.
Computer Communication Networks.
Computer Security.
Genre/Form Conference papers and proceedings.
Conference papers and proceedings.
Form Electronic book
Author Dawson, Ed (Edward)
ISBN 9783642360954 (electronic bk.)
3642360955 (electronic bk.)
Other Titles CT-RSA 2013