My Account Log in

1 option

Topics in Cryptology -- CT-RSA 2015 : The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings / edited by Kaisa Nyberg.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Nyberg, Kaisa., Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 9048
Security and Cryptology ; 9048
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks.
Coding theory.
Information theory.
Cryptology.
Data and Information Security.
Computer Communication Networks.
Coding and Information Theory.
Local Subjects:
Cryptology.
Data and Information Security.
Computer Communication Networks.
Coding and Information Theory.
Physical Description:
1 online resource (XIII, 508 pages) : 79 illustrations
Edition:
1st ed. 2015.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2015.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash functions and message authentication codes, secure multiparty computation, authenticated encryption, detecting and tracing malicious activities, implentation attacks on exponentiation algorithms, and homomorphic encryption and its applications.
Contents:
Timing Attacks
Just A Little Bit More
Cache Storage Attacks
Design and Analysis of Block Ciphers
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
Improved Attacks on Reduced-Round Camellia-128/192/256
Attribute and Identity Based Encryption Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts
Membership
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives
Non-Interactive Zero-Knowledge Proofs of Non-Membership
Secure and Efficient Implementation of AES Based Cryptosystems Implementing GCM on ARMv8
Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON
Chosen Ciphertext Attacks in Theory and Practice Completeness of Single-Bit Projection-KDM Security for Public Key Encryption
Format Oracles on OpenPGP
Algorithms for Solving Hard Problems
Finding Shortest Lattice Vectors in the Presence of Gaps
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints
Constructions of Hash Functions and Message Authentication Codes
Hash Functions from Defective Ideal Ciphers
Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication
Secure Multiparty Computation.-Efficient Leakage Resilient Circuit Compilers
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party
Computation
Authenticated Encryption
How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
Cryptanalysis of Ascon
Detecting and Tracing Malicious Activities Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Implementation Attacks on Exponentiation Algorithms
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace
Cold Boot Attacks in the Discrete Logarithm Setting
Homomorphic Encryption and Its Applications
Communication Optimal Tardos-based Asymmetric Fingerprinting. Linearly Homomorphic Encryption from DDH.
Other Format:
Printed edition:
ISBN:
978-3-319-16715-2
9783319167152
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account