Topics in cryptology - CT-RSA 2010 [electronic resource] : the Cryptographers' track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings / Josef Pieprzyk (Ed.)

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: Cryptographers' Track at RSA Conference San Francisco, Calif.
Other Authors: Pieprzyk, Josef, 1949-
Other title:CT-RSA 2010.
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; Heidelberg : Springer-Verlag, ©2010.
Series:Lecture notes in computer science ; 5985.
LNCS sublibrary. Security and cryptology.
Subjects:
Table of Contents:
  • Invited talk. The first 30 years of cryptographic hash functions and the NIST SHA-3 competition / Bart Preneel
  • Public-key cryptography. Errors matter : breaking RSA-based PIN encryption with thirty ciphertext validity queries / Nigel P. Smart
  • Efficient CRT-RSA decryption for small encryption exponents / Subhamoy Maitra and Santanu Sarkar
  • Resettable public-key encryption : how to encrypt on a virtual machine / Scott Yilek
  • Plaintext-awareness of hybrid encryption / Shaoquan Jiang and Huaxiong Wang
  • Speed records for NTRU / Jens Hermans, Frederik Vercauteren, and Bart Preneel
  • High-speed parallel software implementation of the ηT pairing / Diego F. Aranha, Julio López, and Darrel Hankerson
  • Refinement of Miller's algorithm over Edwards curves / Lei Xu and Dongdai Lin
  • Probabilistic public key encryption with equality test / Guomin Yang, Chik How Tan, Qiong Huang, and Duncan S. Wong
  • Efficient CCA-secure PKE from identity-based techniques / Junzuo Lai, Robert H. Deng, Shengli Liu, and Weidong Kou
  • Anonymity from asymmetry : new constructions for anonymous HIBE / Léo Ducas
  • Making the Diffie-Hellman protocol identity-based / Dario Fiore and Rosario Gennaro
  • On extended sanitizable signature schemes / Sébastien Canard and Amandine Jambert
  • Side-channel attacks. Unrolling cryptographic circuits : a simple countermeasure against side-channel attacks / Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, and Jean-Luc Danger
  • Fault attacks against EMV signatures / Jean-Sébastien Coron, David Naccache, and Mehdi Tibouchi
  • Revisiting higher-order DPA attacks : multivariate mutual information analysis / Benedikt Gierlichs, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede
  • Differential cache-collision timing attacks on AES with applications to embedded CPUs / Andrey Bogdanov, Thomas Eisenbarth, Christof Paar, and Malte Wienecke
  • Cryptographic protocols. Usable optimistic fair exchange / Alptekin Küpçü and Anna Lysyanskaya
  • Hash function combiners in TLS and SSL / Marc Fischlin, Anja Lehmann, and Daniel Wagner
  • Improving efficiency of an 'On the fly' identification scheme by perfecting zero-knowledgeness / Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka
  • Cryptanalysis. Linear cryptanalysis of reduced-round PRESENT / Joo Yeon Cho
  • Dependent linear approximations : the algorithm of Biryukov and others revisited / Miia Hermelin and Kaisa Nyberg
  • Practical key recovery attack against Secret-IV Edon-R / Gaëtan Leurent
  • Rebound attacks on the reduced Grøstl hash function / Florian Mendel, Christian Rechberger, Martin Schläffer, and Søren S. Thomsen
  • Symmetric cryptography. The sum of CBC MACs is a secure PRF / Kan Yasuda
  • On fast verification of hash chains / Dae Hyun Yum, Jin Seok Kim, Pil Joong Lee, and Sung Je Hong.