


default search action
CT-RSA 2018: San Francisco, CA, USA
- Nigel P. Smart:
Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. Lecture Notes in Computer Science 10808, Springer 2018, ISBN 978-3-319-76952-3 - Niels Samwel
, Lejla Batina, Guido Bertoni
, Joan Daemen, Ruggero Susella:
Breaking Ed25519 in WolfSSL. 1-20 - Ahmad Moghimi
, Thomas Eisenbarth
, Berk Sunar:
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX. 21-44 - Martin Ukrop
, Vashek Matyas:
Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability. 45-64 - Jean-Sébastien Coron, Rina Zeitoun:
Improved Factorization of N=p^rq^s. 65-79 - Jonathan Bootle
, Mehdi Tibouchi
, Keita Xagawa
:
Cryptanalysis of Compact-LWE. 80-97 - Zheng Yang
, Yu Chen
, Song Luo
:
Two-Message Key Exchange with Strong Security from Ideal Lattices. 98-115 - Hao Chen, Kim Laine, Rachel Player, Yuhou Xia
:
High-Precision Arithmetic in Homomorphic Encryption. 116-136 - Rhys Carlton, Aleksander Essex
, Krzysztof Kapulkin:
Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons. 137-156 - Steven A. Myers, Adam Shull:
Practical Revocation and Key Rotation. 157-178 - Philippe Camacho
, Fernando Krell
:
Asynchronous Provably-Secure Hidden Services. 179-197 - Akinori Hosoyamada
, Yu Sasaki:
Cryptanalysis Against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations. 198-218 - Jean-Philippe Aumasson, Guillaume Endignoux:
Improving Stateless Hash-Based Signatures. 219-242 - Lorenzo Grassi
:
MixColumns Properties and Attacks on (Round-Reduced) AES with a Single Secret S-Box. 243-263 - Kazuhiko Minematsu
, Kentarou Sasaki, Yuki Tanaka:
Count-then-Permute: A Precision-Free Alternative to Inversion Sampling. 264-278 - Qingju Wang
, Lorenzo Grassi
, Christian Rechberger:
Zero-Sum Partitions of PHOTON Permutations. 279-299 - Yusuke Naito:
Improved Security Bound of LightMAC_Plus and Its Single-Key Variant. 300-318 - David Pointcheval
, Olivier Sanders:
Reassessing Security of Randomizable Signatures. 319-338 - Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, Bruce Murray:
Differential Attacks on Deterministic Signatures. 339-353 - Christian Badertscher
, Ueli Maurer:
Composable and Robust Outsourced Storage. 354-373 - Jian Liu
, Li Duan
, Yong Li
, N. Asokan
:
Secure Deduplication of Encrypted Data: Refined Model and New Constructions. 374-393 - Daniel P. Martin
, Luke Mather
, Elisabeth Oswald
:
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. 394-412 - Florian Unterstein
, Johann Heyszl
, Fabrizio De Santis
, Robert Specht
, Georg Sigl
:
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And an Improved Construction. 413-434 - Donghoon Chang
, Amit Kumar Chauhan
, Sandeep Kumar
, Somitra Kumar Sanadhya
:
Revocable Identity-Based Encryption from Codes with Rank Metric. 435-451 - Brian Koziel, Reza Azarderakhsh, David Jao
:
An Exposure Model for Supersingular Isogeny Diffie-Hellman Key Exchange. 452-469 - Johannes Blömer, Fabian Eidens, Jakob Juhnke:
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. 470-490 - Yu Chen, Baodong Qin, Haiyang Xue
:
Regularly Lossy Functions and Applications. 491-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.