default search action
CT-RSA 2005: San Francisco, CA, USA
- Alfred Menezes:
Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings. Lecture Notes in Computer Science 3376, Springer 2005, ISBN 3-540-24399-2
Invited Talks
- Cynthia Dwork:
Sub-linear Queries Statistical Databases: Privacy with Power. 1-6 - Adam L. Young, Moti Yung:
Malicious Cryptography: Kleptographic Aspects. 7-18
Cryptanalysis
- Olivier Billet, Henri Gilbert:
Resistance of SNOW 2.0 Against Algebraic Attacks. 19-28 - An Braeken, Christopher Wolf, Bart Preneel:
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. 29-43 - Zvi Gutterman, Dahlia Malkhi:
Hold Your Sessions: An Attack on Java Session-Id Generation. 44-57 - Vincent Rijmen, Elisabeth Oswald:
Update on SHA-1. 58-71 - Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
A Fast Correlation Attack on the Shrinking Generator. 72-86
Public-Key Encryption
- Dan Boneh, Jonathan Katz:
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. 87-103 - Yang Cui, Kazukuni Kobara, Hideki Imai:
A Generic Conversion with Optimal Redundancy. 104-117 - Nick Howgrave-Graham, Joseph H. Silverman, William Whyte:
Choosing Parameter Sets forwithand. 118-135
Signature Schemes
- Mihir Bellare, Haixia Shi, Chong Zhang:
Foundations of Group Signatures: The Case of Dynamic Groups. 136-153 - Fabien Laguillaumie, Damien Vergnaud:
Time-Selective Convertible Undeniable Signatures. 154-171
Design Principles
- Amir Herzberg:
On Tolerant Cryptographic Constructions. 172-190
Password-Based Protocols
- Michel Abdalla, David Pointcheval:
Simple Password-Based Encrypted Key Exchange Protocols. 191-208 - Philip D. MacKenzie, Sarvar Patel:
Hard Bits of the Discrete Log with Applications to Password Authentication. 209-226 - Michael Szydlo, Burton S. Kaliski Jr.:
Proofs for Two-Server Password Authentication. 227-244 - Frances F. Yao, Yiqun Lisa Yin:
Design and Analysis of Password-Based Key Derivation Functions. 245-261
Pairings
- Noel McCullagh, Paulo S. L. M. Barreto:
A New Two-Party Identity-Based Authenticated Key Agreement. 262-274 - Lan Nguyen:
Accumulators from Bilinear Pairings and Applications. 275-292 - Michael Scott:
Computing the Tate Pairing. 293-304 - Tsz Hon Yuen, Victor K. Wei:
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. 305-322
Efficient and Secure Implementation
- Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. 323-333 - Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck:
CryptoGraphics: Secret Key Cryptography Using Graphics Cards. 334-350 - Stefan Mangard, Thomas Popp, Berndt M. Gammel:
Side-Channel Leakage of Masked CMOS Gates. 351-365 - James A. Muir, Douglas R. Stinson:
New Minimal Weight Representations for Left-to-Right Window Methods. 366-383
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.