default search action
CT-RSA 2011: San Francisco, CA, USA
- Aggelos Kiayias:
Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. Lecture Notes in Computer Science 6558, Springer 2011, ISBN 978-3-642-19073-5
Secure Two-Party Computation
- Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, Ivan Visconti:
Secure Set Intersection with Untrusted Hardware Tokens. 1-16 - Ching-Hua Yu, Sherman S. M. Chow, Kai-Min Chung, Feng-Hao Liu:
Efficient Secure Two-Party Exponentiation. 17-32
Cryptographic Primitives
- Kun Peng:
A General, Flexible and Efficient Proof of Inclusion and Exclusion. 33-48 - Sherman S. M. Chow, Kristiyan Haralambiev:
Non-interactive Confirmer Signatures. 49-64 - Kashi Neupane, Rainer Steinwandt:
Communication-Efficient 2-Round Group Key Establishment from Pairings. 65-76
Side Channel Attacks
- Marc F. Witteman, Jasper G. J. van Woudenberg, Federico Menarini:
Defeating RSA Multiply-Always and Message Blinding Countermeasures. 77-88 - Chester Rebeiro, Debdeep Mukhopadhyay:
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns. 89-103 - Jasper G. J. van Woudenberg, Marc F. Witteman, Bram Bakker:
Improving Differential Power Analysis by Elastic Alignment. 104-119
Invited Talk
- Richard M. George:
NSA's Role in the Development of DES. 120
Authenticated Key Agreement
- Atsushi Fujioka, Koutarou Suzuki:
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys. 121-141 - Michel Abdalla, Céline Chevalier, Louis Granboulan, David Pointcheval:
Contributory Password-Authenticated Group Key Exchange with Join Capability. 142-160
Proofs of Security
- Ralf Küsters, Max Tuengerthal:
Ideal Key Derivation and Encryption in Simulation-Based Security. 161-179 - Gilles Barthe, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella Béguelin:
Beyond Provable Security Verifiable IND-CCA Security of OAEP. 180-196 - Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama:
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. 197-212 - Jooyoung Lee, Martijn Stam:
MJH: A Faster Alternative to MDC-2. 213-236
Block Ciphers
- Phillip Rogaway, Haibin Zhang:
Online Ciphers from Tweakable Blockciphers. 237-249 - Gautham Sekar, Nicky Mouha, Vesselin Velichkov, Bart Preneel:
Meet-in-the-Middle Attacks on Reduced-Round XTEA. 250-267
Security Notions
- Paul Baecher, Marc Fischlin, Dominique Schröder:
Expedient Non-malleability Notions for Hash Functions. 268-283 - Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Manuel González Nieto:
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. 284-301
Public-Key Encryption
- Joonsang Baek, Cheng-Kang Chu, Jianying Zhou:
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes. 302-318 - Richard Lindner, Chris Peikert:
Better Key Sizes (and Attacks) for LWE-Based Encryption. 319-339
Crypto Tools and Parameters
- Julien Devigne, Marc Joye:
Binary Huff Curves. 340-355 - Antoine Joux, Vanessa Vitse:
A Variant of the F4 Algorithm. 356-375 - Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek:
Attribute-Based Signatures. 376-392
Digital Signatures
- Eiichiro Fujisaki:
Sub-linear Size Traceable Ring Signatures without Random Oracles. 393-415
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.