Limit search to available items
Book Cover
E-book
Author Cryptographers' Track at RSA Conference (2012 : San Francisco, Calif.)

Title Topics in cryptology-- CT-RSA 2012 : the Cryptographers' track at the RSA Conference 2012, San Francisco, CA, USA, February 27-March 2, 2012. Proceedings / Orr Dunkelman (ed.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource (xiii, 434 pages)
Series Lecture notes in computer science, 0302-9743 ; 7178
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7178.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Machine generated contents note: Side Channel Attacks I -- Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures: An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism / Christof Paar -- Power Analysis of Atmel CryptoMemory -- Recovering Keys from Secure EEPROMs / Ingrid Verbauwhede -- Digital Signatures I -- Short Transitive Signatures for Directed Trees / Alejandro Hevia -- Short Attribute-Based Signatures for Threshold Predicates / Carla Rafols -- Public-Key Encryption I -- Reducing the Key Size of Rainbow Using Non-commutative Rings / Tsuyoshi Takagi -- Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation / Colin D. Walter -- Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves / Nicolas Estibals -- Cryptographic Protocols I -- On the Joint Security of Encryption and Signature in EMV / Mario Strefler -- New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications / Eiichiro Fujisaki -- Secure Implementation Methods -- First-Order Leak-Free Masking Countermeasure / Jean-Luc Danger -- Practical Realisation and Elimination of an ECC-Related Software Bug Attack / Frederik Vercauteren -- Symmetric Key Primitives -- New Pseudorandom Generator from Collision-Resistant Hash Functions / Virendra Kumar -- PMAC with Parity: Minimizing the Query-Length Influence / Kan Yasuda -- Boomerang Attacks on Hash Function Using Auxiliary Differentials / Arnab Roy -- Side Channel Attacks II -- Localized Electromagnetic Analysis of Cryptographic Implementations / Georg Sigl -- Towards Different Flavors of Combined Side Channel Attacks / Jean-Luc Danger -- Digital Signatures II -- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More / Noboru Kunihiro
Note continued: Secure Computation, I/O-Efficient Algorithms and Distributed Signatures / Tomas Toft -- Cryptographic Protocols II -- Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation / Pooya Farshim -- Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting / Tomas Toft -- Public-Key Encryption II -- Plaintext-Checkable Encryption / Fabien Laguillaumie -- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption / Yunlei Zhao -- Side Channel Attacks III -- New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models / Marc Stottinger -- Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis / Jasper G.J. van Woudenberg -- Secure Multiparty Computation -- Efficient Protocol for Oblivious DFA Evaluation and Applications / Babak Sadeghiyan -- Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces / Dan Rubenstein
Summary Annotation This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012. The 26 revised full papers presented were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and secure multiparty computation
Analysis Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Computational complexity
Discrete Mathematics in Computer Science
Systems and Data Security
Algorithm Analysis and Problem Complexity
algoritmen
algorithms
computeranalyse
computer analysis
wiskunde
mathematics
computerwetenschappen
computer sciences
computernetwerken
computer networks
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography Includes bibliographical references and author index
Subject Data encryption (Computer science) -- Congresses
Data protection -- Congresses
Computer security -- Congresses
Informatique.
Computer security
Data encryption (Computer science)
Data protection
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Dunkelman, Orr.
ISBN 9783642279546
3642279546
Other Titles CT-RSA 2012