default search action
CT-RSA 2007: San Francisco, CA, USA
- Masayuki Abe:
Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings. Lecture Notes in Computer Science 4377, Springer 2006, ISBN 3-540-69327-0
Symmetric-Key Encryption
- Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan:
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. 1-19 - Eli Biham, Orr Dunkelman, Nathan Keller:
A Simple Related-Key Attack on the Full SHACAL-1. 20-30
Signatures and Authentication
- Pascal Paillier:
Impossibility Proofs for RSA Signatures in the Standard Model. 31-48 - Eric R. Verheul:
Selecting Secure Passwords. 49-66 - Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee:
Human Identification Through Image Evaluation Using Secret Predicates. 67-84
Hash Functions
- Florian Mendel, Joseph Lano, Bart Preneel:
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. 85-100 - Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Second Preimages for SMASH. 101-111
Digital Signatures (I)
- Haifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang:
A Practical Optimal Padding for Signature Schemes. 112-128 - Xun Yi:
Directed Transitive Signature Scheme. 129-144 - Mihir Bellare, Gregory Neven:
Identity-Based Multi-signatures from RSA. 145-162
Cryptographic Protocols (I)
- Matthew K. Franklin, Mark A. Gondree, Payman Mohassel:
Improved Efficiency for Private Stable Matching. 163-177 - Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu:
Compact E-Cash from Bounded Accumulator. 178-195 - Koji Chida, Go Yamamoto:
Batch Processing of Interactive Proofs. 196-207
Side-Channel Attacks (I)
- Joseph H. Silverman, William Whyte:
Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. 208-224 - Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert:
Predicting Secret Keys Via Branch Prediction. 225-242
Side-Channel Attacks (II)
- Elisabeth Oswald, Stefan Mangard:
Template Attacks on Masking - Resistance Is Futile. 243-256 - Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten:
Differential Power Analysis of Stream Ciphers. 257-270 - Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç:
Cache Based Remote Timing Attack on the AES. 271-286
Cryptographic Protocols (II)
- Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. 287-308 - Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won:
Efficient Password-Authenticated Key Exchange Based on RSA. 309-323 - Yvo Desmedt, Goce Jakimoski:
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. 324-338
Digital Signatures (II)
- Benoît Chevallier-Mames, Marc Joye:
A Practical and Tightly Secure Signature Scheme Without Hash Function. 339-356 - Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang:
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. 357-371
E?cient Implementation
- Máire McLoone, Matthew J. B. Robshaw:
Public Key Cryptography and RFID Tags. 372-384 - Karl Scheibelhofer:
A Bit-Slice Implementation of the Whirlpool Hash Function. 385-401
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.