Topics in Cryptology – CT-RSA 2013

The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings

  • Ed Dawson
Conference proceedings CT-RSA 2013

DOI: 10.1007/978-3-642-36095-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7779)

Table of contents (25 papers)

  1. Front Matter
  2. Side Channel Attacks I

    1. Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
      Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Justine Wild
      Pages 1-17
    2. Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL
      Cyril Arnaud, Pierre-Alain Fouque
      Pages 18-33
  3. Digital Signatures I

    1. Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures
      Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling et al.
      Pages 50-67
  4. Public-Key Encryption I

  5. Cryptographic Protocols I

    1. Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes
      Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
      Pages 101-114
    2. Randomized Partial Checking Revisited
      Shahram Khazaei, Douglas Wikström
      Pages 115-128
  6. Secure Implementation Methods

    1. Randomly Failed! The State of Randomness in Current Java Implementations
      Kai Michaelis, Christopher Meyer, Jörg Schwenk
      Pages 129-144
    2. Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl
      Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald et al.
      Pages 145-161
  7. Symmetric Key Primitives I

    1. Collisions for the WIDEA-8 Compression Function
      Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varıcı
      Pages 162-173
    2. Finding Collisions for Round-Reduced SM3
      Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 174-188
    3. Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures
      Stanislav Bulygin, Michael Walter, Johannes Buchmann
      Pages 189-206
  8. Side Channel Attacks II

  9. Cryptographic Protocols II

    1. Cryptanalytic Attacks on MIFARE Classic Protocol
      Jovan Dj. Golić
      Pages 239-258
    2. Asynchronous Computational VSS with Reduced Communication Complexity
      Michael Backes, Amit Datta, Aniket Kate
      Pages 259-276
  10. Public-Key Encryption II

    1. Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012
      Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
      Pages 277-292
    2. Solving BDD by Enumeration: An Update
      Mingjie Liu, Phong Q. Nguyen
      Pages 293-309

About these proceedings


This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013.

The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.


ciphertext enterprise defense hashing information security randomness

Editors and affiliations

  • Ed Dawson
    • 1
  1. 1.Institute for Future EnviromentsQueensland University of TechnologyBrisbaneAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-36094-7
  • Online ISBN 978-3-642-36095-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349