


default search action
CT-RSA 2013: San Francisco, CA, USA
- Ed Dawson:

Topics in Cryptology - CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings. Lecture Notes in Computer Science 7779, Springer 2013, ISBN 978-3-642-36094-7
Side Channel Attacks I
- Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild:

Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations. 1-17 - Cyril Arnaud, Pierre-Alain Fouque:

Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL. 18-33
Digital Signatures I
- Philippe Camacho:

Fair Exchange of Short Signatures without Trusted Third Party. 34-49 - Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling

, Huaxiong Wang:
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures. 50-67
Public-Key Encryption I
- Yannick Seurin, Joana Treger:

A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption. 68-83 - Shengli Liu, Jian Weng

, Yunlei Zhao:
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks. 84-100
Cryptographic Protocols I
- Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering:

Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. 101-114 - Shahram Khazaei

, Douglas Wikström:
Randomized Partial Checking Revisited. 115-128
Secure Implementation Methods
- Kai Michaelis, Christopher Meyer, Jörg Schwenk:

Randomly Failed! The State of Randomness in Current Java Implementations. 129-144 - Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald, Wolfgang Wieser:

Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl. 145-161
Symmetric Key Primitives I
- Florian Mendel

, Vincent Rijmen
, Deniz Toz, Kerem Varici:
Collisions for the WIDEA-8 Compression Function. 162-173 - Florian Mendel

, Tomislav Nad, Martin Schläffer:
Finding Collisions for Round-Reduced SM3. 174-188 - Stanislav Bulygin, Michael Walter

, Johannes Buchmann:
Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures. 189-206
Side Channel Attacks II
- Thomas Korak, Thomas Plos:

Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag. 207-222 - Yu Yu, François-Xavier Standaert

:
Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness. 223-238
Cryptographic Protocols II
- Jovan Dj. Golic:

Cryptanalytic Attacks on MIFARE Classic Protocol. 239-258 - Michael Backes, Amit Datta, Aniket Kate:

Asynchronous Computational VSS with Reduced Communication Complexity. 259-276
Public-Key Encryption II
- Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka:

Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012. 277-292 - Mingjie Liu, Phong Q. Nguyen:

Solving BDD by Enumeration: An Update. 293-309
Identity-Based Encryption
- Karyn Benson, Hovav Shacham, Brent Waters:

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions. 310-325 - Junzuo Lai, Robert H. Deng

, Yunlei Zhao, Jian Weng
:
Accountable Authority Identity-Based Encryption with Public Traceability. 326-342 - Jae Hong Seo

, Keita Emura
:
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption. 343-358
Symmetric Key Primitives II
- Mike Bond, George French, Nigel P. Smart, Gaven J. Watson:

The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users. 359-374 - Michal Hojsík, Veronika Pulpánová:

A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy. 375-388 - Jiqiang Lu, Wun-She Yap

, Yongzhuang Wei:
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis. 389-404

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














