default search action
CT-RSA 2014: San Francisco, CA, USA
- Josh Benaloh:
Topics in Cryptology - CT-RSA 2014 - The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings. Lecture Notes in Computer Science 8366, Springer 2014, ISBN 978-3-319-04851-2
Non-integral Asymmetric Functions
- Armando Faz-Hernández, Patrick Longa, Ana Helena Sánchez:
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves. 1-27 - Shi Bai, Steven D. Galbraith:
An Improved Compression Technique for Signatures Based on Learning with Errors. 28-47
Public-Key Encryption
- Dennis Hofheinz, Christoph Striecks:
A Generic View on Trace-and-Revoke Broadcast Encryption Schemes. 48-63 - Nelly Fazio, Antonio Nicolosi, Irippuge Milinda Perera:
Broadcast Steganography. 64-84 - Sherman S. M. Chow, Matthew K. Franklin, Haibin Zhang:
Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications. 85-105
Hardware Implementations
- Jeroen Delvaux, Ingrid Verbauwhede:
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation. 106-131 - Frederik Armknecht, Vasily Mikhalev:
On Increasing the Throughput of Stream Ciphers. 132-151 - Duc-Phong Le, Matthieu Rivain, Chik How Tan:
On Double Exponentiation for Securing RSA against Fault Analysis. 152-168
Side-Channel Attacks
- Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
On the Practical Security of a Leakage Resilient Masking Scheme. 169-182 - Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert:
The Myth of Generic DPA...and the Magic of Learning. 183-205 - Lubos Gaspar, Gaëtan Leurent, François-Xavier Standaert:
Hardware Implementation and Side-Channel Analysis of Lapin. 206-226
Symmetric Encryption and Cryptanalysis
- Alex Biryukov, Vesselin Velichkov:
Automatic Search for Differential Trails in ARX Ciphers. 227-250 - Markku-Juhani O. Saarinen:
CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions. 251-269 - Markku-Juhani O. Saarinen:
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation. 270-285
Digital Signatures
- Benoît Libert, Marc Joye:
Group Signatures with Message-Dependent Opening in the Standard Model. 286-306 - Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu:
Practical Distributed Signatures in the Standard Model. 307-326 - Ali El Kaafarani, Essam Ghadafi, Dalia Khader:
Decentralized Traceable Attribute-Based Signatures. 327-348
Protocols
- Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, Brent Waters:
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions. 349-366 - Qiong Huang, Duncan S. Wong, Willy Susilo:
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures. 367-384 - Kaoru Kurosawa, Jun Furukawa:
2-Pass Key Exchange Protocols from CPA-Secure KEM. 385-401
Hash Function Cryptanalysis
- Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. 402-423 - Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta:
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl. 424-443 - Gaoli Wang:
Practical Collision Attack on 40-Step RIPEMD-128. 444-460
Applications of Cryptographic Primitives
- Gareth T. Davies, Martijn Stam:
KDM Security in the Hybrid Framework. 461-480 - Dmitry Khovratovich:
Key Wrapping with a Fixed Permutation. 481-499
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.