


default search action
CT-RSA 2010: San Francisco, CA, USA
- Josef Pieprzyk:
Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings. Lecture Notes in Computer Science 5985, Springer 2010, ISBN 978-3-642-11924-8
Invited Talk
- Bart Preneel
:
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition. 1-14
Public-Key Cryptography
- Nigel P. Smart:
Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries. 15-25 - Subhamoy Maitra, Santanu Sarkar
:
Efficient CRT-RSA Decryption for Small Encryption Exponents. 26-40 - Scott Yilek:
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine. 41-56 - Shaoquan Jiang, Huaxiong Wang:
Plaintext-Awareness of Hybrid Encryption. 57-72 - Jens Hermans, Frederik Vercauteren
, Bart Preneel
:
Speed Records for NTRU. 73-88 - Diego F. Aranha
, Julio López, Darrel Hankerson:
High-Speed Parallel Software Implementation of the ηT Pairing. 89-105 - Lei Xu
, Dongdai Lin:
Refinement of Miller's Algorithm Over Edwards Curves. 106-118 - Guomin Yang
, Chik How Tan, Qiong Huang, Duncan S. Wong:
Probabilistic Public Key Encryption with Equality Test. 119-131 - Junzuo Lai, Robert H. Deng
, Shengli Liu, Weidong Kou:
Efficient CCA-Secure PKE from Identity-Based Techniques. 132-147 - Léo Ducas:
Anonymity from Asymmetry: New Constructions for Anonymous HIBE. 148-164 - Dario Fiore, Rosario Gennaro:
Making the Diffie-Hellman Protocol Identity-Based. 165-178 - Sébastien Canard, Amandine Jambert:
On Extended Sanitizable Signature Schemes. 179-194
Side-Channel Attacks
- Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger:
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks. 195-207 - Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
:
Fault Attacks Against emv Signatures. 208-220 - Benedikt Gierlichs, Lejla Batina, Bart Preneel
, Ingrid Verbauwhede
:
Revisiting Higher-Order DPA Attacks: . 221-234 - Andrey Bogdanov
, Thomas Eisenbarth
, Christof Paar, Malte Wienecke:
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs. 235-251
Cryptographic Protocols
- Alptekin Küpçü
, Anna Lysyanskaya:
Usable Optimistic Fair Exchange. 252-267 - Marc Fischlin, Anja Lehmann, Daniel Wagner:
Hash Function Combiners in TLS and SSL. 268-283 - Bagus Santoso
, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka:
Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness. 284-301
Cryptanalysis
- Joo Yeon Cho:
Linear Cryptanalysis of Reduced-Round PRESENT. 302-317 - Miia Hermelin, Kaisa Nyberg:
Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited. 318-333 - Gaëtan Leurent
:
Practical Key Recovery Attack against Secret-IV Edon-. 334-349 - Florian Mendel
, Christian Rechberger, Martin Schläffer, Søren S. Thomsen:
Rebound Attacks on the Reduced Grøstl Hash Function. 350-365
Symmetric Cryptography
- Kan Yasuda:
The Sum of CBC MACs Is a Secure PRF. 366-381 - Dae Hyun Yum, Jin Seok Kim, Pil Joong Lee, Sung Je Hong:
On Fast Verification of Hash Chains. 382-396

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.