Topics in Cryptology – CT-RSA 2017

The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings

  • Helena Handschuh

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10159)

Also part of the Security and Cryptology book sub series (LNSC, volume 10159)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Public Key Implementations

    1. Front Matter
      Pages 1-1
    2. Jeff Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
      Pages 3-18
  3. Lattice-Based Cryptanalysis

    1. Front Matter
      Pages 37-37
    2. Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, Chen-Mou Cheng
      Pages 39-57
    3. Atsushi Takayasu, Noboru Kunihiro
      Pages 58-73
  4. Fault and Glitch Resistant Implementations

  5. Side-channel Resistant Implementations

    1. Front Matter
      Pages 113-113
    2. Pascal Sasdrich, Amir Moradi, Tim Güneysu
      Pages 131-146
  6. Digital Signatures and Random Numbers

    1. Front Matter
      Pages 147-147
    2. Yuan Ma, Jingqiang Lin, Jiwu Jing
      Pages 165-180
  7. Post-quantum Cryptography

    1. Front Matter
      Pages 181-181
    2. Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook
      Pages 183-204
  8. Symmetric Key Cryptanalysis

    1. Front Matter
      Pages 205-205

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017.

The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions.

CT-RSA has become a major publication venue in cryptography. It covers a wide variety of topics from public-key to symmetric key cryptography and from cryptographic protocols to primitives and their implementation security. This year selected topics such as cryptocurrencies and white-box cryptography were added to the call for papers.

Keywords

cryptanalysis elliptic curves hardware security public-key encryption symmetric cryptography

Editors and affiliations

  • Helena Handschuh
    • 1
  1. 1.Cryptography Research Inc. San FranciscoUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-52153-4
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-52152-7
  • Online ISBN 978-3-319-52153-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book