default search action
CT-RSA 2017: San Francisco, CA, USA
- Helena Handschuh:
Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings. Lecture Notes in Computer Science 10159, Springer 2017, ISBN 978-3-319-52152-7
Public Key Implementations
- Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
Choosing Parameters for NTRUEncrypt. 3-18 - Marc Joye, Benoît Libert:
Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves. 19-35
Lattice-Based Cryptanalysis
- Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, Chen-Mou Cheng:
Gauss Sieve Algorithm on GPUs. 39-57 - Atsushi Takayasu, Noboru Kunihiro:
A Tool Kit for Partial Key Exposure Attacks on RSA. 58-73
Fault and Glitch Resistant Implementations
- Jakub Breier, Xiaolu Hou:
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme. 77-94 - Hannes Groß, Stefan Mangard, Thomas Korak:
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order. 95-112
Side-channel Resistant Implementations
- Praveen Kumar Vadnala:
Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers. 115-130 - Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware. 131-146
Digital Signatures and Random Numbers
- Dan Boneh, Shay Gueron:
Surnaming Schemes, Fast Verification, and Applications to SGX Technology. 149-164 - Yuan Ma, Jingqiang Lin, Jiwu Jing:
On the Entropy of Oscillator-Based True Random Number Generators. 165-180
Post-quantum Cryptography
- Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook:
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World. 183-204
Symmetric Key Cryptanalysis
- Christoph Dobraunig, Eik List:
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC. 207-222 - Bart Mennink:
Weak Keys for AEZ, and the External Key Padding Attack. 223-237
Symmetric Key Constructions
- Louiza Khati, Nicky Mouha, Damien Vergnaud:
Full Disk Encryption: Bridging Theory and Practice. 241-257 - Eik List, Mridul Nandi:
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption. 258-274
2017 Selected Topics
- Ren Zhang, Bart Preneel:
Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin. 277-292 - Jihoon Cho, Kyu Young Choi, Itai Dinur, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg:
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction. 293-308
Improved Key Recovery Algorithms
- Liron David, Avishai Wool:
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks. 311-327 - Noboru Kunihiro, Yuki Takahashi:
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise. 328-343
Side-channel Analysis
- Weijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang:
Ridge-Based Profiled Differential Power Analysis. 347-362 - Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma:
My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses. 363-378
Cryptographic Protocols
- Michele Orrù, Emmanuela Orsini, Peter Scholl:
Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection. 381-396 - Fernando Krell, Gabriela F. Ciocarlie, Ashish Gehani, Mariana Raykova:
Low-Leakage Secure Search for Boolean Expressions. 397-413
Public Key Algorithms
- Dingding Jia, Xianhui Lu, Bao Li:
Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks. 417-431 - Yohei Watanabe, Keita Emura, Jae Hong Seo:
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. 432-449
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.