Description |
1 online resource (xiii, 434 pages) |
Series |
Lecture notes in computer science, 0302-9743 ; 7178 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7178.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Machine generated contents note: Side Channel Attacks I -- Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures: An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism / Christof Paar -- Power Analysis of Atmel CryptoMemory -- Recovering Keys from Secure EEPROMs / Ingrid Verbauwhede -- Digital Signatures I -- Short Transitive Signatures for Directed Trees / Alejandro Hevia -- Short Attribute-Based Signatures for Threshold Predicates / Carla Rafols -- Public-Key Encryption I -- Reducing the Key Size of Rainbow Using Non-commutative Rings / Tsuyoshi Takagi -- Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation / Colin D. Walter -- Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves / Nicolas Estibals -- Cryptographic Protocols I -- On the Joint Security of Encryption and Signature in EMV / Mario Strefler -- New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications / Eiichiro Fujisaki -- Secure Implementation Methods -- First-Order Leak-Free Masking Countermeasure / Jean-Luc Danger -- Practical Realisation and Elimination of an ECC-Related Software Bug Attack / Frederik Vercauteren -- Symmetric Key Primitives -- New Pseudorandom Generator from Collision-Resistant Hash Functions / Virendra Kumar -- PMAC with Parity: Minimizing the Query-Length Influence / Kan Yasuda -- Boomerang Attacks on Hash Function Using Auxiliary Differentials / Arnab Roy -- Side Channel Attacks II -- Localized Electromagnetic Analysis of Cryptographic Implementations / Georg Sigl -- Towards Different Flavors of Combined Side Channel Attacks / Jean-Luc Danger -- Digital Signatures II -- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More / Noboru Kunihiro |
|
Note continued: Secure Computation, I/O-Efficient Algorithms and Distributed Signatures / Tomas Toft -- Cryptographic Protocols II -- Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation / Pooya Farshim -- Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting / Tomas Toft -- Public-Key Encryption II -- Plaintext-Checkable Encryption / Fabien Laguillaumie -- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption / Yunlei Zhao -- Side Channel Attacks III -- New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models / Marc Stottinger -- Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis / Jasper G.J. van Woudenberg -- Secure Multiparty Computation -- Efficient Protocol for Oblivious DFA Evaluation and Applications / Babak Sadeghiyan -- Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces / Dan Rubenstein |
Summary |
Annotation This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012. The 26 revised full papers presented were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and secure multiparty computation |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data protection |
|
Data encryption (Computer science) |
|
Computer software |
|
Computational complexity |
|
Discrete Mathematics in Computer Science |
|
Systems and Data Security |
|
Algorithm Analysis and Problem Complexity |
|
algoritmen |
|
algorithms |
|
computeranalyse |
|
computer analysis |
|
wiskunde |
|
mathematics |
|
computerwetenschappen |
|
computer sciences |
|
computernetwerken |
|
computer networks |
|
gegevensbeheer |
|
data management |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references and author index |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Data protection -- Congresses
|
|
Computer security -- Congresses
|
|
Informatique.
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Data protection
|
Genre/Form |
Conference papers and proceedings
|
|
Software.
|
Form |
Electronic book
|
Author |
Dunkelman, Orr.
|
ISBN |
9783642279546 |
|
3642279546 |
|