Topics in Cryptology – CT-RSA 2006

The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005. Proceedings

  • David Pointcheval
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3860)

Table of contents

  1. Front Matter
  2. Attacks on AES

    1. Dag Arne Osvik, Adi Shamir, Eran Tromer
      Pages 1-20
    2. Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 21-33
  3. Identification

    1. Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater
      Pages 52-63
  4. Algebra

    1. Xinxin Fan, Thomas Wollinger, Yumin Wang
      Pages 64-81
    2. M. Jason Hinek
      Pages 82-98
  5. Integrity

    1. Michael Szydlo, Yiqun Lisa Yin
      Pages 99-114
    2. Pim Tuyls, Lejla Batina
      Pages 115-131
  6. Public Key Encryption

    1. Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu, Feipei Lai
      Pages 132-149
    2. Kristian Gjøsteen
      Pages 150-158
  7. Signatures

    1. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shinichi Kawamura
      Pages 174-191
  8. Side-Channel Attacks

    1. Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich
      Pages 192-207
    2. Kai Schramm, Christof Paar
      Pages 208-225
  9. CCA Encryption

  10. Message Authentication

    1. Michel Abdalla, Chanathip Namprempre, Gregory Neven
      Pages 262-279
    2. Sylvain Pasini, Serge Vaudenay
      Pages 280-294
  11. Block Ciphers

    1. Orr Dunkelman, Nathan Keller
      Pages 295-312

About these proceedings

Introduction

The RSA R Conference, with over 15,000attendees, as well as over 225 sponsors and exhibitors, is the largest computer security event of the year. The Cr- tographers’ Track is one of the many parallel tracks. These proceedings contain the papers presented during the sixth edition. The tradition indeed started in 2001, and is by now well established: the Cryptographers’ Track at the RSA Conference is among the major events in cryptography. There were 72 submitted contributions, of which 22 were selected for p- sentation. They cover all aspects of cryptography (symmetric and asymmetric cryptography, constructions and attacks, new trends). In addition, the program includes two invited talks, by Xiaoyun Wang on “Cryptanalysis of Hash fu- tions and Potential Dangers,” and Philip MacKenzie on “Passwords Will Not Die: How Cryptography Can Help Deal with Them. ” All the submissions were reviewed by at least three members of the Program Committee. Iamverygratefultothe24membersfortheirhardandconscientious work.

Keywords

AES CCA encryption DES Message Authentication Code Oracle RSA authentication block ciphers communication cryptanalysis cryptographic protocols cryptology data security information security security

Editors and affiliations

  • David Pointcheval
    • 1
  1. 1.Ecole Normale Supérieure – LIENS/CNRS/INRIAFrance

Bibliographic information

  • DOI https://doi.org/10.1007/11605805
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-31033-4
  • Online ISBN 978-3-540-32648-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book