My Account Log in

1 option

Topics in Cryptology - CT- RSA 2013 : The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings / edited by Ed Dawson.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024)
Format:
Book
Contributor:
Dawson, Ed, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 7779.
Security and Cryptology ; 7779
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer security.
Operating systems (Computers).
Electronic commerce.
Computer networks.
Coding theory.
Information theory.
Cryptology.
Systems and Data Security.
Operating Systems.
e-Commerce/e-business.
Computer Communication Networks.
Coding and Information Theory.
Local Subjects:
Cryptology.
Systems and Data Security.
Operating Systems.
e-Commerce/e-business.
Computer Communication Networks.
Coding and Information Theory.
Physical Description:
1 online resource (XIV, 405 pages) : 68 illustrations.
Edition:
First edition 2013.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.
Contents:
Side Channel Attacks I
Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.-Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL
Digital Signatures I.-Fair Exchange of Short Signatures without Trusted Third Party
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures
Public-Key Encryption I
Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
Cryptographic Protocols I
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes
Randomized Partial Checking Revisited
Secure Implementation Methods
Randomly Failed! The State of Randomness in Current Java Implementations
Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implementations for Grøstl
Symmetric Key Primitives I
Collisions for the WIDEA-8 Compression Function
Finding Collisions for Round-Reduced SM3
Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures
Side Channel Attacks II
Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag
Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
Cryptographic Protocols II
Cryptanalytic Attacks on MIFARE Classic Protocol
Asynchronous Computational VSS with Reduced Communication Complexity
Public-Key Encryption II.-Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012
Solving BDD by Enumeration: An Update
Identity-Based Encryption
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
Accountable Authority Identity-Based Encryption with Public Traceability
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
Symmetric Key Primitives II
The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users
A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.
Other Format:
Printed edition:
ISBN:
978-3-642-36095-4
9783642360954
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account