Topics in Cryptology – CT-RSA 2009

The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings

  • Marc Fischlin
Conference proceedings CT-RSA 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5473)

Table of contents

  1. Front Matter
  2. Identity-Based Encryption

  3. Protocol Analysis

    1. Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel
      Pages 48-65
  4. Two-Party Protocols

    1. Mihir Bellare, Shanshan Duan, Adriana Palacio
      Pages 84-99
    2. Manoj Prabhakaran, Rui Xue
      Pages 100-116
  5. More Than Signatures

    1. Ee-Chien Chang, Chee Liang Lim, Jia Xu
      Pages 133-147
    2. Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang
      Pages 148-163
  6. Collisions for Hash Functions

    1. Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic
      Pages 164-181
    2. Christophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor
      Pages 182-194
  7. Cryptanalysis

    1. B. Collard, F. -X. Standaert
      Pages 195-210
    2. Thomas Popp, Mario Kirschbaum, Stefan Mangard
      Pages 211-225
    3. Orr Dunkelman, Nathan Keller
      Pages 226-239
  8. Alternative Encryption

    1. Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento
      Pages 240-251
    2. Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, Ming-shing Chen
      Pages 252-264
  9. Privacy and Anonymity

    1. Matthew Franklin, Mark Gondree, Payman Mohassel
      Pages 265-278
    2. Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
      Pages 279-294
  10. Effciency Improvements

    1. Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen
      Pages 309-324
    2. Dae Hyun Yum, Jae Woo Seo, Sungwook Eom, Pil Joong Lee
      Pages 325-339
    3. Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
      Pages 340-356
  11. Multi-Party Protocols

  12. Security of Encryption Schemes

  13. Faults and Countermeasures

    1. Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, Louis Goubin
      Pages 414-428
    2. Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta
      Pages 429-443
  14. Countermeasures and Faults

  15. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009.

The 31 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols, more than signatures, collisions for hash functions, cryptanalysis, alternative encryption, privacy and anonymity, efficiency improvements, multi-party protocols, security of encryption schemes as well as countermeasures and faults.


AES DECT authentication anonymity block cipher bluetooth collission search cryptology cryptosystems fractal hash identity-based key exchange privacy pseudorandom public key cryptography

Editors and affiliations

  • Marc Fischlin
    • 1
  1. 1.Theoretical Computer ScienceTU DarmstadtDarmstadtGermany

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-00861-0
  • Online ISBN 978-3-642-00862-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site