Topics in Cryptology – CT-RSA 2007

The Cryptographers’ Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings

Editors:

ISBN: 978-3-540-69327-7 (Print) 978-3-540-69328-4 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Symmetric-Key Encryption

    1. No Access

      Book Chapter

      Pages 1-19

      MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers

    2. No Access

      Book Chapter

      Pages 20-30

      A Simple Related-Key Attack on the Full SHACAL-1

  3. Signatures and Authentication

    1. No Access

      Book Chapter

      Pages 31-48

      Impossibility Proofs for RSA Signatures in the Standard Model

    2. No Access

      Book Chapter

      Pages 49-66

      Selecting Secure Passwords

    3. No Access

      Book Chapter

      Pages 67-84

      Human Identification Through Image Evaluation Using Secret Predicates

  4. Hash Functions

    1. No Access

      Book Chapter

      Pages 85-100

      Cryptanalysis of Reduced Variants of the FORK-256 Hash Function

    2. No Access

      Book Chapter

      Pages 101-111

      Second Preimages for SMASH

  5. Digital Signatures (I)

    1. No Access

      Book Chapter

      Pages 112-128

      A Practical Optimal Padding for Signature Schemes

    2. No Access

      Book Chapter

      Pages 129-144

      Directed Transitive Signature Scheme

    3. No Access

      Book Chapter

      Pages 145-162

      Identity-Based Multi-signatures from RSA

  6. Cryptographic Protocols (I)

    1. No Access

      Book Chapter

      Pages 163-177

      Improved Efficiency for Private Stable Matching

    2. No Access

      Book Chapter

      Pages 178-195

      Compact E-Cash from Bounded Accumulator

    3. No Access

      Book Chapter

      Pages 196-207

      Batch Processing of Interactive Proofs

  7. Side-Channel Attacks (I)

    1. No Access

      Book Chapter

      Pages 208-224

      Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls

    2. No Access

      Book Chapter

      Pages 225-242

      Predicting Secret Keys Via Branch Prediction

  8. Side-Channel Attacks (II)

    1. No Access

      Book Chapter

      Pages 243-256

      Template Attacks on Masking—Resistance Is Futile

    2. No Access

      Book Chapter

      Pages 257-270

      Differential Power Analysis of Stream Ciphers

    3. No Access

      Book Chapter

      Pages 271-286

      Cache Based Remote Timing Attack on the AES

  9. Cryptographic Protocols (II)

    1. No Access

      Book Chapter

      Pages 287-308

      Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement

    2. No Access

      Book Chapter

      Pages 309-323

      Efficient Password-Authenticated Key Exchange Based on RSA

previous Page of 2