Topics in Cryptology – CT-RSA 2004

The Cryptographers’ Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings

Editors:

ISBN: 978-3-540-20996-6 (Print) 978-3-540-24660-2 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Symmetric Encryption

    1. No Access

      Book Chapter

      Pages 1-14

      Online Encryption Schemes: New Security Notions and Constructions

    2. No Access

      Book Chapter

      Pages 15-24

      Related-Key Attacks on Triple-DES and DESX Variants

    3. No Access

      Book Chapter

      Pages 25-38

      Design of AES Based on Dual Cipher and Composite Field

    4. No Access

      Book Chapter

      Pages 39-53

      Periodic Properties of Counter Assisted Stream Ciphers

    5. No Access

      Book Chapter

      Pages 54-66

      A Fast Correlation Attack via Unequal Error Correcting LDPC Codes

  3. Aymmetric Encryption

    1. No Access

      Book Chapter

      Pages 67-80

      k-Resilient Identity-Based Encryption in the Standard Model

    2. No Access

      Book Chapter

      Pages 81-98

      A Generic Construction for Intrusion-Resilient Public-Key Encryption

  4. Digital Signatures

    1. No Access

      Book Chapter

      Pages 99-111

      A Certificate-Based Signature Scheme

    2. No Access

      Book Chapter

      Pages 112-125

      Identity Based Undeniable Signatures

    3. No Access

      Book Chapter

      Pages 126-128

      Compressing Rabin Signatures

  5. Protocols

    1. No Access

      Book Chapter

      Pages 129-142

      A Key Recovery System as Secure as Factoring

    2. No Access

      Book Chapter

      Pages 143-156

      Server Assisted Signatures Revisited

    3. No Access

      Book Chapter

      Pages 157-162

      Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt ‘95

    4. No Access

      Book Chapter

      Pages 163-178

      Universal Re-encryption for Mixnets

    5. No Access

      Book Chapter

      Pages 179-193

      Bit String Commitment Reductions with a Non-zero Rate

    6. No Access

      Book Chapter

      Pages 194-207

      Improving Robustness of PGP Keyrings by Conflict Detection

  6. Side-Channel Attacks

    1. No Access

      Book Chapter

      Pages 208-221

      Issues of Security with the Oswald-Aigner Exponentiation Algorithm

    2. No Access

      Book Chapter

      Pages 222-235

      Hardware Countermeasures against DPA – A Statistical Analysis of Their Effectiveness

    3. No Access

      Book Chapter

      Pages 236-249

      Self-Randomized Exponentiation Algorithms

  7. Hardwares

    1. No Access

      Book Chapter

      Pages 250-263

      Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems

previous Page of 2