Skip to main content
  • Conference proceedings
  • © 2012

Topics in Cryptology - CT-RSA 2012

The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012, Proceedings

Editors:

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7178)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CT-RSA: Cryptographers’ Track at the RSA Conference

Conference proceedings info: CT-RSA 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Cryptographic Protocols II

    1. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

      • Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft
      Pages 313-331
  2. Public-Key Encryption II

    1. Plaintext-Checkable Encryption

      • SĂ©bastien Canard, Georg Fuchsbauer, Aline Gouget, Fabien Laguillaumie
      Pages 332-348
    2. Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption

      • Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang et al.
      Pages 349-364
  3. Side Channel Attacks III

    1. A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models

      • Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger
      Pages 365-382
    2. Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis

      • Lejla Batina, Jip Hogenboom, Jasper G. J. van Woudenberg
      Pages 383-397
    3. An Efficient Protocol for Oblivious DFA Evaluation and Applications

      • Payman Mohassel, Salman Niksefat, Saeed Sadeghian, Babak Sadeghiyan
      Pages 398-415
    4. Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces

      • Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein
      Pages 416-432
  4. Back Matter

Other Volumes

  1. Topics in Cryptology – CT-RSA 2012

About this book

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012. The 26 revised full papers presented were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and secure multiparty computation.

Editors and Affiliations

  • Computer Science Department, University of Haifa, Haifa, Israel

    Orr Dunkelman

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access