Topics in cryptology - CT-RSA 2010 [electronic resource] : the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings / Josef Pieprzyk (Ed.)
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | |
Other title: | CT-RSA 2010. |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Berlin ; Heidelberg :
Springer-Verlag,
©2010.
|
Series: | Lecture notes in computer science ;
5985. LNCS sublibrary. Security and cryptology. |
Subjects: |
Table of Contents:
- Invited talk. The first 30 years of cryptographic hash functions and the NIST SHA-3 competition / Bart Preneel
- Public-key cryptography. Errors matter : breaking RSA-based PIN encryption with thirty ciphertext validity queries / Nigel P. Smart
- Efficient CRT-RSA decryption for small encryption exponents / Subhamoy Maitra and Santanu Sarkar
- Resettable public-key encryption : how to encrypt on a virtual machine / Scott Yilek
- Plaintext-awareness of hybrid encryption / Shaoquan Jiang and Huaxiong Wang
- Speed records for NTRU / Jens Hermans, Frederik Vercauteren, and Bart Preneel
- High-speed parallel software implementation of the ηT pairing / Diego F. Aranha, Julio López, and Darrel Hankerson
- Refinement of Miller's algorithm over Edwards curves / Lei Xu and Dongdai Lin
- Probabilistic public key encryption with equality test / Guomin Yang, Chik How Tan, Qiong Huang, and Duncan S. Wong
- Efficient CCA-secure PKE from identity-based techniques / Junzuo Lai, Robert H. Deng, Shengli Liu, and Weidong Kou
- Anonymity from asymmetry : new constructions for anonymous HIBE / Léo Ducas
- Making the Diffie-Hellman protocol identity-based / Dario Fiore and Rosario Gennaro
- On extended sanitizable signature schemes / Sébastien Canard and Amandine Jambert
- Side-channel attacks. Unrolling cryptographic circuits : a simple countermeasure against side-channel attacks / Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, and Jean-Luc Danger
- Fault attacks against EMV signatures / Jean-Sébastien Coron, David Naccache, and Mehdi Tibouchi
- Revisiting higher-order DPA attacks : multivariate mutual information analysis / Benedikt Gierlichs, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede
- Differential cache-collision timing attacks on AES with applications to embedded CPUs / Andrey Bogdanov, Thomas Eisenbarth, Christof Paar, and Malte Wienecke
- Cryptographic protocols. Usable optimistic fair exchange / Alptekin Küpçü and Anna Lysyanskaya
- Hash function combiners in TLS and SSL / Marc Fischlin, Anja Lehmann, and Daniel Wagner
- Improving efficiency of an 'On the fly' identification scheme by perfecting zero-knowledgeness / Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka
- Cryptanalysis. Linear cryptanalysis of reduced-round PRESENT / Joo Yeon Cho
- Dependent linear approximations : the algorithm of Biryukov and others revisited / Miia Hermelin and Kaisa Nyberg
- Practical key recovery attack against Secret-IV Edon-R / Gaëtan Leurent
- Rebound attacks on the reduced Grøstl hash function / Florian Mendel, Christian Rechberger, Martin Schläffer, and Søren S. Thomsen
- Symmetric cryptography. The sum of CBC MACs is a secure PRF / Kan Yasuda
- On fast verification of hash chains / Dae Hyun Yum, Jin Seok Kim, Pil Joong Lee, and Sung Je Hong.