Skip to main content
  • Conference proceedings
  • © 2012

Topics in Cryptology - CT-RSA 2012

The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012, Proceedings

Editors:

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7178)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CT-RSA: Cryptographers’ Track at the RSA Conference

Conference proceedings info: CT-RSA 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Side Channel Attacks I

    1. Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures

      • Amir Moradi, Markus Kasper, Christof Paar
      Pages 1-18
    2. Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs

      • Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede
      Pages 19-34
  3. Digital Signatures I

    1. Short Transitive Signatures for Directed Trees

      • Philippe Camacho, Alejandro Hevia
      Pages 35-50
    2. Short Attribute-Based Signatures for Threshold Predicates

      • Javier Herranz, Fabien Laguillaumie, BenoĂ®t Libert, Carla RĂ fols
      Pages 51-67
  4. Public-Key Encryption I

    1. Reducing the Key Size of Rainbow Using Non-commutative Rings

      • Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi
      Pages 68-83
    2. Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves

      • Diego F. Aranha, Jean-Luc Beuchat, JĂ©rĂ©mie Detrey, Nicolas Estibals
      Pages 98-115
  5. Cryptographic Protocols I

    1. On the Joint Security of Encryption and Signature in EMV

      • Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler
      Pages 116-135
  6. Secure Implementation Methods

    1. A First-Order Leak-Free Masking Countermeasure

      • Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger
      Pages 156-170
    2. Practical Realisation and Elimination of an ECC-Related Software Bug Attack

      • Billy B. Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren
      Pages 171-186
  7. Symmetric Key Primitives

    1. A New Pseudorandom Generator from Collision-Resistant Hash Functions

      • Alexandra Boldyreva, Virendra Kumar
      Pages 187-202
    2. Boomerang Attacks on Hash Function Using Auxiliary Differentials

      • GaĂ«tan Leurent, Arnab Roy
      Pages 215-230
  8. Side Channel Attacks II

    1. Localized Electromagnetic Analysis of Cryptographic Implementations

      • Johann Heyszl, Stefan Mangard, Benedikt Heinz, Frederic Stumpf, Georg Sigl
      Pages 231-244
    2. Towards Different Flavors of Combined Side Channel Attacks

      • Youssef Souissi, Shivam Bhasin, Sylvain Guilley, Maxime Nassar, Jean-Luc Danger
      Pages 245-259
  9. Digital Signatures II

    1. Secure Computation, I/O-Efficient Algorithms and Distributed Signatures

      • Ivan DamgĂĄrd, Jonas Kölker, Tomas Toft
      Pages 278-295
  10. Cryptographic Protocols II

Other Volumes

  1. Topics in Cryptology – CT-RSA 2012

About this book

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012. The 26 revised full papers presented were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and secure multiparty computation.

Editors and Affiliations

  • Computer Science Department, University of Haifa, Haifa, Israel

    Orr Dunkelman

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access