Topics in Cryptology – CT-RSA 2011

The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings

  • Aggelos Kiayias
Conference proceedings CT-RSA 2011
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6558)

Table of contents

  1. Front Matter
  2. Secure Two-Party Computation

    1. Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, Ivan Visconti
      Pages 1-16
    2. Ching-Hua Yu, Sherman S. M. Chow, Kai-Min Chung, Feng-Hao Liu
      Pages 17-32
  3. Cryptographic Primitives

    1. Sherman S. M. Chow, Kristiyan Haralambiev
      Pages 49-64
    2. Kashi Neupane, Rainer Steinwandt
      Pages 65-76
  4. Side Channel Attacks

    1. Marc F. Witteman, Jasper G. J. van Woudenberg, Federico Menarini
      Pages 77-88
    2. Chester Rebeiro, Debdeep Mukhopadhyay
      Pages 89-103
    3. Jasper G. J. van Woudenberg, Marc F. Witteman, Bram Bakker
      Pages 104-119
  5. Invited Talk

    1. Richard M. George
      Pages 120-120
  6. Authenticated Key Agreement

    1. Michel Abdalla, Céline Chevalier, Louis Granboulan, David Pointcheval
      Pages 142-160
  7. Proofs of Security

    1. Ralf Küsters, Max Tuengerthal
      Pages 161-179
    2. Gilles Barthe, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella Béguelin
      Pages 180-196
    3. Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama
      Pages 197-212
    4. Jooyoung Lee, Martijn Stam
      Pages 213-236
  8. Block Ciphers

    1. Phillip Rogaway, Haibin Zhang
      Pages 237-249
    2. Gautham Sekar, Nicky Mouha, Vesselin Velichkov, Bart Preneel
      Pages 250-267
  9. Security Notions

    1. Paul Baecher, Marc Fischlin, Dominique Schröder
      Pages 268-283
    2. Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Gonzalez Nieto
      Pages 284-301

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011.
The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.

Keywords

authenticated key exchange cryptanalysis cryptographic protocols elliptic curves hash function message blinding oblivious transfer pairing security protocols side channel analysis simulation-based security systems security time series analysis untrusted hardware zero-knowledge

Editors and affiliations

  • Aggelos Kiayias
    • 1
  1. 1.Department of Informatics and TelecommunicationsNational and Kapodistrian University of AthenAthensGreece

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-19074-2
  • Copyright Information Springer Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-19073-5
  • Online ISBN 978-3-642-19074-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book