Topics in Cryptology – CT-RSA 2013

The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings

  • Ed Dawson
Conference proceedings CT-RSA 2013

DOI: 10.1007/978-3-642-36095-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7779)

Table of contents

  1. Front Matter
  2. Side Channel Attacks I

    1. Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Justine Wild
      Pages 1-17
    2. Cyril Arnaud, Pierre-Alain Fouque
      Pages 18-33
  3. Digital Signatures I

    1. Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling et al.
      Pages 50-67
  4. Public-Key Encryption I

  5. Cryptographic Protocols I

    1. Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
      Pages 101-114
    2. Shahram Khazaei, Douglas Wikström
      Pages 115-128
  6. Secure Implementation Methods

    1. Kai Michaelis, Christopher Meyer, Jörg Schwenk
      Pages 129-144
    2. Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald et al.
      Pages 145-161
  7. Symmetric Key Primitives I

    1. Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varıcı
      Pages 162-173
    2. Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 174-188
    3. Stanislav Bulygin, Michael Walter, Johannes Buchmann
      Pages 189-206
  8. Side Channel Attacks II

  9. Cryptographic Protocols II

    1. Jovan Dj. Golić
      Pages 239-258
    2. Michael Backes, Amit Datta, Aniket Kate
      Pages 259-276
  10. Public-Key Encryption II

    1. Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
      Pages 277-292
    2. Mingjie Liu, Phong Q. Nguyen
      Pages 293-309

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013.

The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

Keywords

ciphertext enterprise defense hashing information security randomness

Editors and affiliations

  • Ed Dawson
    • 1
  1. 1.Institute for Future EnviromentsQueensland University of TechnologyBrisbaneAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-36094-7
  • Online ISBN 978-3-642-36095-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349