


default search action
CT-RSA 2012: San Francisco, CA, USA
- Orr Dunkelman:
Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings. Lecture Notes in Computer Science 7178, Springer 2012, ISBN 978-3-642-27953-9
Side Channel Attacks I
- Amir Moradi
, Markus Kasper, Christof Paar:
Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism. 1-18 - Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede
:
Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs. 19-34
Digital Signatures I
- Philippe Camacho, Alejandro Hevia
:
Short Transitive Signatures for Directed Trees. 35-50 - Javier Herranz
, Fabien Laguillaumie, Benoît Libert, Carla Ràfols
:
Short Attribute-Based Signatures for Threshold Predicates. 51-67
Public-Key Encryption I
- Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi:
Reducing the Key Size of Rainbow Using Non-commutative Rings. 68-83 - Colin D. Walter:
A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation. 84-97 - Diego F. Aranha
, Jean-Luc Beuchat
, Jérémie Detrey, Nicolas Estibals:
Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves. 98-115
Cryptographic Protocols I
- Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler:
On the Joint Security of Encryption and Signature in EMV. 116-135 - Eiichiro Fujisaki:
New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications. 136-155
Secure Implementation Methods
- Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger:
A First-Order Leak-Free Masking Countermeasure. 156-170 - Billy Bob Brumley
, Manuel Barbosa
, Dan Page, Frederik Vercauteren
:
Practical Realisation and Elimination of an ECC-Related Software Bug Attack. 171-186
Symmetric Key Primitives
- Alexandra Boldyreva, Virendra Kumar
:
A New Pseudorandom Generator from Collision-Resistant Hash Functions. 187-202 - Kan Yasuda:
PMAC with Parity: Minimizing the Query-Length Influence. 203-214 - Gaëtan Leurent
, Arnab Roy
:
Boomerang Attacks on Hash Function Using Auxiliary Differentials. 215-230
Side Channel Attacks II
- Johann Heyszl, Stefan Mangard, Benedikt Heinz, Frederic Stumpf, Georg Sigl:
Localized Electromagnetic Analysis of Cryptographic Implementations. 231-244 - Youssef Souissi, Shivam Bhasin, Sylvain Guilley, Maxime Nassar, Jean-Luc Danger:
Towards Different Flavors of Combined Side Channel Attacks. 245-259
Digital Signatures II
- Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
:
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More. 260-277 - Ivan Damgård, Jonas Kölker, Tomas Toft:
Secure Computation, I/O-Efficient Algorithms and Distributed Signatures. 278-295
Cryptographic Protocols II
- Manuel Barbosa
, Pooya Farshim:
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation. 296-312 - Carmit Hazay
, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft:
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. 313-331
Public-Key Encryption II
- Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Fabien Laguillaumie:
Plaintext-Checkable Encryption. 332-348 - Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro
, Takahiro Matsuda, Jian Weng
, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. 349-364
Side Channel Attacks III
- Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger
:
A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models. 365-382 - Lejla Batina, Jip Hogenboom, Jasper G. J. van Woudenberg:
Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis. 383-397 - Payman Mohassel, Salman Niksefat, Seyed Saeed Sadeghian, Babak Sadeghiyan:
An Efficient Protocol for Oblivious DFA Evaluation and Applications. 398-415 - Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein:
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces. 416-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.