Topics in Cryptology – CT-RSA 2009

The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings

  • Marc Fischlin
Conference proceedings CT-RSA 2009
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5473)

Table of contents

  1. Front Matter
  2. Identity-Based Encryption

  3. Protocol Analysis

    1. Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel
      Pages 48-65
  4. Two-Party Protocols

    1. Mihir Bellare, Shanshan Duan, Adriana Palacio
      Pages 84-99
    2. Manoj Prabhakaran, Rui Xue
      Pages 100-116
  5. More Than Signatures

    1. Ee-Chien Chang, Chee Liang Lim, Jia Xu
      Pages 133-147
    2. Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang
      Pages 148-163
  6. Collisions for Hash Functions

    1. Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic
      Pages 164-181
    2. Christophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor
      Pages 182-194
  7. Cryptanalysis

    1. B. Collard, F. -X. Standaert
      Pages 195-210
    2. Thomas Popp, Mario Kirschbaum, Stefan Mangard
      Pages 211-225
    3. Orr Dunkelman, Nathan Keller
      Pages 226-239
  8. Alternative Encryption

    1. Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento
      Pages 240-251
    2. Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, Ming-shing Chen
      Pages 252-264
  9. Privacy and Anonymity

    1. Matthew Franklin, Mark Gondree, Payman Mohassel
      Pages 265-278
    2. Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
      Pages 279-294

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009.

The 31 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols, more than signatures, collisions for hash functions, cryptanalysis, alternative encryption, privacy and anonymity, efficiency improvements, multi-party protocols, security of encryption schemes as well as countermeasures and faults.

Keywords

AES DECT authentication anonymity block cipher bluetooth collission search cryptology cryptosystems fractal hash identity-based key exchange privacy pseudorandom public key cryptography

Editors and affiliations

  • Marc Fischlin
    • 1
  1. 1.Theoretical Computer ScienceTU DarmstadtDarmstadtGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-00862-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-00861-0
  • Online ISBN 978-3-642-00862-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book