Topics in Cryptology – CT-RSA 2012

The Cryptographers’ Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 – March 2, 2012. Proceedings

  • Orr Dunkelman
Conference proceedings CT-RSA 2012

DOI: 10.1007/978-3-642-27954-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7178)

Table of contents

  1. Front Matter
  2. Side Channel Attacks I

    1. Amir Moradi, Markus Kasper, Christof Paar
      Pages 1-18
    2. Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede
      Pages 19-34
  3. Digital Signatures I

    1. Philippe Camacho, Alejandro Hevia
      Pages 35-50
    2. Javier Herranz, Fabien Laguillaumie, Benoît Libert, Carla Ràfols
      Pages 51-67
  4. Public-Key Encryption I

    1. Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi
      Pages 68-83
    2. Diego F. Aranha, Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals
      Pages 98-115
  5. Cryptographic Protocols I

    1. Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler
      Pages 116-135
  6. Secure Implementation Methods

    1. Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger
      Pages 156-170
    2. Billy B. Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren
      Pages 171-186
  7. Symmetric Key Primitives

  8. Side Channel Attacks II

    1. Johann Heyszl, Stefan Mangard, Benedikt Heinz, Frederic Stumpf, Georg Sigl
      Pages 231-244
    2. Youssef Souissi, Shivam Bhasin, Sylvain Guilley, Maxime Nassar, Jean-Luc Danger
      Pages 245-259
  9. Digital Signatures II

    1. Ivan Damgård, Jonas Kölker, Tomas Toft
      Pages 278-295
  10. Cryptographic Protocols II

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012. The 26 revised full papers presented were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and secure multiparty computation.

Keywords

elliptic curve cryptography hash function multivariate public key cryptosystem provable security threshold encryption scheme

Editors and affiliations

  • Orr Dunkelman
    • 1
  1. 1.Computer Science DepartmentUniversity of HaifaHaifaIsrael

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-27953-9
  • Online ISBN 978-3-642-27954-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349