default search action
CT-RSA 2013: San Francisco, CA, USA
- Ed Dawson:
Topics in Cryptology - CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings. Lecture Notes in Computer Science 7779, Springer 2013, ISBN 978-3-642-36094-7
Side Channel Attacks I
- Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild:
Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations. 1-17 - Cyril Arnaud, Pierre-Alain Fouque:
Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL. 18-33
Digital Signatures I
- Philippe Camacho:
Fair Exchange of Short Signatures without Trusted Third Party. 34-49 - Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling, Huaxiong Wang:
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures. 50-67
Public-Key Encryption I
- Yannick Seurin, Joana Treger:
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption. 68-83 - Shengli Liu, Jian Weng, Yunlei Zhao:
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks. 84-100
Cryptographic Protocols I
- Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. 101-114 - Shahram Khazaei, Douglas Wikström:
Randomized Partial Checking Revisited. 115-128
Secure Implementation Methods
- Kai Michaelis, Christopher Meyer, Jörg Schwenk:
Randomly Failed! The State of Randomness in Current Java Implementations. 129-144 - Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald, Wolfgang Wieser:
Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl. 145-161
Symmetric Key Primitives I
- Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici:
Collisions for the WIDEA-8 Compression Function. 162-173 - Florian Mendel, Tomislav Nad, Martin Schläffer:
Finding Collisions for Round-Reduced SM3. 174-188 - Stanislav Bulygin, Michael Walter, Johannes Buchmann:
Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures. 189-206
Side Channel Attacks II
- Thomas Korak, Thomas Plos:
Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag. 207-222 - Yu Yu, François-Xavier Standaert:
Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness. 223-238
Cryptographic Protocols II
- Jovan Dj. Golic:
Cryptanalytic Attacks on MIFARE Classic Protocol. 239-258 - Michael Backes, Amit Datta, Aniket Kate:
Asynchronous Computational VSS with Reduced Communication Complexity. 259-276
Public-Key Encryption II
- Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka:
Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012. 277-292 - Mingjie Liu, Phong Q. Nguyen:
Solving BDD by Enumeration: An Update. 293-309
Identity-Based Encryption
- Karyn Benson, Hovav Shacham, Brent Waters:
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions. 310-325 - Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng:
Accountable Authority Identity-Based Encryption with Public Traceability. 326-342 - Jae Hong Seo, Keita Emura:
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption. 343-358
Symmetric Key Primitives II
- Mike Bond, George French, Nigel P. Smart, Gaven J. Watson:
The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users. 359-374 - Michal Hojsík, Veronika Pulpánová:
A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy. 375-388 - Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis. 389-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.