Topics in Cryptology – CT-RSA 2014

The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings

  • Josh Benaloh
Conference proceedings CT-RSA 2014
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8366)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Non-integral Asymmetric Functions

  3. Public-Key Encryption

    1. Dennis Hofheinz, Christoph Striecks
      Pages 48-63
    2. Nelly Fazio, Antonio R. Nicolosi, Irippuge Milinda Perera
      Pages 64-84
    3. Sherman S. M. Chow, Matthew Franklin, Haibin Zhang
      Pages 85-105
  4. Hardware Implementations

    1. Frederik Armknecht, Vasily Mikhalev
      Pages 132-151
    2. Duc-Phong Le, Matthieu Rivain, Chik How Tan
      Pages 152-168
  5. Side-Channel Attacks

    1. Emmanuel Prouff, Matthieu Rivain, Thomas Roche
      Pages 169-182
    2. Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert
      Pages 183-205
    3. Lubos Gaspar, Gaëtan Leurent, François-Xavier Standaert
      Pages 206-226
  6. Symmetric Encryption and Cryptanalysis

  7. Digital Signatures

    1. Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu
      Pages 307-326
    2. Ali El Kaafarani, Essam Ghadafi, Dalia Khader
      Pages 327-348
  8. Protocols

    1. Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, Brent Waters
      Pages 349-366
    2. Qiong Huang, Duncan S. Wong, Willy Susilo
      Pages 367-384

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014. The 25 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cryptanalysis, digital signatures, protocols, hash function cryptanalysis, and applications of cryptographic primitives.

Keywords

block and stream ciphers cryptanalysis and other attacks cryptographic primitives cryptography digital signatures hash functions information security key management public key encryption security protocols

Editors and affiliations

  • Josh Benaloh
    • 1
  1. 1.Microsoft ResearchRedmondUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-04852-9
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-04851-2
  • Online ISBN 978-3-319-04852-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book