default search action
CT-RSA 2009: San Francisco, CA, USA
- Marc Fischlin:
Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings. Lecture Notes in Computer Science 5473, Springer 2009, ISBN 978-3-642-00861-0
Identity-Based Encryption
- Benoît Libert, Damien Vergnaud:
Adaptive-ID Secure Revocable Identity-Based Encryption. 1-15 - Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. 16-31 - Giuseppe Ateniese, Paolo Gasti:
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. 32-47
Protocol Analysis
- Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel:
Attacks on the DECT Authentication Mechanisms. 48-65 - Andrew Y. Lindell:
Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1. 66-83
Two-Party Protocols
- Mihir Bellare, Shanshan Duan, Adriana Palacio:
Key Insulation and Intrusion Resilience over a Public Channel. 84-99 - Manoj Prabhakaran, Rui Xue:
Statistically Hiding Sets. 100-116 - Andrew Y. Lindell:
Adaptively Secure Two-Party Computation with Erasures. 117-132
More Than Signatures
- Ee-Chien Chang, Chee Liang Lim, Jia Xu:
Short Redactable Signatures Using Random Trees. 133-147 - Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang:
Divisible On-Line/Off-Line Signatures. 148-163
Collisions for Hash Functions
- Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic:
Speeding up Collision Search for Byte-Oriented Hash Functions. 164-181 - Christophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor:
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. 182-194
Cryptanalysis
- Baudoin Collard, François-Xavier Standaert:
A Statistical Saturation Attack against the Block Cipher PRESENT. 195-210 - Thomas Popp, Mario Kirschbaum, Stefan Mangard:
Practical Attacks on Masked Hardware. 211-225 - Orr Dunkelman, Nathan Keller:
Cryptanalysis of CTC2. 226-239
Alternative Encryption
- Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento:
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model. 240-251 - Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, Ming-Shing Chen:
Square, a New Multivariate Encryption Scheme. 252-264
Privacy and Anonymity
- Matthew K. Franklin, Mark A. Gondree, Payman Mohassel:
Communication-Efficient Private Protocols for Longest Common Subsequence. 265-278 - Giuseppe Ateniese, Karyn Benson, Susan Hohenberger:
Key-Private Proxy Re-encryption. 279-294 - Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu:
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. 295-308
Effciency Improvements
- Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen:
Practical Short Signature Batch Verification. 309-324 - Dae Hyun Yum, Jae Woo Seo, Sungwook Eom, Pil Joong Lee:
Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity. 325-339 - Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume:
Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients. 340-356
Multi-Party Protocols
- Tomas Toft:
Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values. 357-371 - Andrew Y. Lindell:
Local Sequentiality Does Not Help for Concurrent Composition. 372-388
Security of Encryption Schemes
- David Galindo:
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. 389-398 - Alexandra Boldyreva:
Strengthening Security of RSA-OAEP. 399-413
Faults and Countermeasures
- Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, Louis Goubin:
Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. 414-428 - Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta:
Fault Analysis Attack against an AES Prototype Chip Using RSL. 429-443
Countermeasures and Faults
- Thomas Plos:
Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. 444-458 - Matthieu Rivain:
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. 459-480
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.