Topics in Cryptology – CT-RSA 2013

The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings

Editors:

ISBN: 978-3-642-36094-7 (Print) 978-3-642-36095-4 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Side Channel Attacks I

    1. No Access

      Book Chapter

      Pages 1-17

      Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations

    2. No Access

      Book Chapter

      Pages 18-33

      Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL

  3. Digital Signatures I

    1. No Access

      Book Chapter

      Pages 34-49

      Fair Exchange of Short Signatures without Trusted Third Party

    2. No Access

      Book Chapter

      Pages 50-67

      Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures

  4. Public-Key Encryption I

    1. No Access

      Book Chapter

      Pages 68-83

      A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption

    2. No Access

      Book Chapter

      Pages 84-100

      Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks

  5. Cryptographic Protocols I

    1. No Access

      Book Chapter

      Pages 101-114

      Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    2. No Access

      Book Chapter

      Pages 115-128

      Randomized Partial Checking Revisited

  6. Secure Implementation Methods

    1. No Access

      Book Chapter

      Pages 129-144

      Randomly Failed! The State of Randomness in Current Java Implementations

    2. No Access

      Book Chapter

      Pages 145-161

      Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl

  7. Symmetric Key Primitives I

    1. No Access

      Book Chapter

      Pages 162-173

      Collisions for the WIDEA-8 Compression Function

    2. No Access

      Book Chapter

      Pages 174-188

      Finding Collisions for Round-Reduced SM3

    3. No Access

      Book Chapter

      Pages 189-206

      Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures

  8. Side Channel Attacks II

    1. No Access

      Book Chapter

      Pages 207-222

      Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag

    2. No Access

      Book Chapter

      Pages 223-238

      Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness

  9. Cryptographic Protocols II

    1. No Access

      Book Chapter

      Pages 239-258

      Cryptanalytic Attacks on MIFARE Classic Protocol

    2. No Access

      Book Chapter

      Pages 259-276

      Asynchronous Computational VSS with Reduced Communication Complexity

  10. Public-Key Encryption II

    1. No Access

      Book Chapter

      Pages 277-292

      Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012

    2. No Access

      Book Chapter

      Pages 293-309

      Solving BDD by Enumeration: An Update

  11. Identity-Based Encryption

    1. No Access

      Book Chapter

      Pages 310-325

      The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions

previous Page of 2