Topics in Cryptology - CT- RSA 2013 : The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings / edited by Ed Dawson.
- Format:
-
- Contributor:
-
- Series:
-
- Language:
- English
- Subjects (All):
-
- Local Subjects:
-
- Physical Description:
- 1 online resource (XIV, 405 pages) : 68 illustrations.
- Edition:
- First edition 2013.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
- System Details:
- text file PDF
- Summary:
- This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.
- Contents:
-
- Side Channel Attacks I
- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.-Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL
- Digital Signatures I.-Fair Exchange of Short Signatures without Trusted Third Party
- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures
- Public-Key Encryption I
- Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Cryptographic Protocols I
- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes
- Randomized Partial Checking Revisited
- Secure Implementation Methods
- Randomly Failed! The State of Randomness in Current Java Implementations
- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implementations for Grøstl
- Symmetric Key Primitives I
- Collisions for the WIDEA-8 Compression Function
- Finding Collisions for Round-Reduced SM3
- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures
- Side Channel Attacks II
- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
- Cryptographic Protocols II
- Cryptanalytic Attacks on MIFARE Classic Protocol
- Asynchronous Computational VSS with Reduced Communication Complexity
- Public-Key Encryption II.-Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012
- Solving BDD by Enumeration: An Update
- Identity-Based Encryption
- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
- Accountable Authority Identity-Based Encryption with Public Traceability
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
- Symmetric Key Primitives II
- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users
- A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy
- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.
- Other Format:
- Printed edition:
- ISBN:
-
- 978-3-642-36095-4
- 9783642360954
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.