Cryptographers’ Track at the RSA Conference

Topics in Cryptology - CT-RSA 2016

The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings

  • Kazue Sako

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9610)

Also part of the Security and Cryptology book sub series (LNSC, volume 9610)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Secure Key Exchange Schemes

    1. Front Matter
      Pages 1-1
    2. Olivier Blazy, Céline Chevalier, Damien Vergnaud
      Pages 3-18
    3. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
      Pages 19-36
  3. Authenticated Encryption

    1. Front Matter
      Pages 37-37
    2. Avik Chakraborti, Nilanjan Datta, Mridul Nandi
      Pages 39-54
  4. Searchable Symmetric Encryption

    1. Front Matter
      Pages 73-73
    2. Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
      Pages 90-107
  5. Digital Signatures with New Functionality

    1. Front Matter
      Pages 109-109
    2. David Pointcheval, Olivier Sanders
      Pages 111-126
    3. Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer
      Pages 127-143
  6. Secure Multi Party Computation

    1. Front Matter
      Pages 145-145
    2. James Alderman, Christian Janson, Carlos Cid, Jason Crampton
      Pages 147-163
    3. Chongwon Cho, Dana Dachman-Soled, Stanisław Jarecki
      Pages 164-179
  7. How to Verify Procedures

    1. Front Matter
      Pages 181-181
    2. Gunnar Hartung
      Pages 183-199
    3. Prastudy Fauzi, Helger Lipmaa
      Pages 200-216
  8. Side-Channel Attacks on Elliptic Curve Cryptography

    1. Front Matter
      Pages 217-217

About these proceedings


This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016.

The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.


cryptanalysis and other attacks cryptography digital signatures hash functions public key encryption anonymity block ciphers countermeasures distributed computation message authentication codes number theoretic transform outsourced computation pair encoding schemes PRF-security privacy private cloud computing secure databases security model side-channel analysis stream ciphers

Editors and affiliations

  • Kazue Sako
    • 1
  1. 1.NEC Cloud Systems Research LaboratoriesKawasakiJapan

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-29484-1
  • Online ISBN 978-3-319-29485-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book