Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic prools, secure implementation methods, symmetric key primitives, and identity-based encryption.
1117758058
Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic prools, secure implementation methods, symmetric key primitives, and identity-based encryption.
54.99 In Stock
Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings

Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings

Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings

Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings

Paperback(2013)

$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic prools, secure implementation methods, symmetric key primitives, and identity-based encryption.

Product Details

ISBN-13: 9783642360947
Publisher: Springer Berlin Heidelberg
Publication date: 12/21/2012
Series: Lecture Notes in Computer Science , #7779
Edition description: 2013
Pages: 405
Product dimensions: 6.10(w) x 9.25(h) x 0.03(d)

Table of Contents

Side Channel Attacks I.- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.-Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL.- Digital Signatures I.-Fair Exchange of Short Signatures without Trusted Third Party.- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.- Public-Key Encryption I.- Robust and Plaintext-Aware Variant of Signed ElGamal Encryption.- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.- Cryptographic Prools I.- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes.- Randomized Partial Checking Revisited.- Secure Implementation Methods.- Randomly Failed! The State of Randomness in Current Java Implementations.- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implementations for Grøstl.- Symmetric Key Primitives I.- Collisions for the WIDEA-8 Compression Function.- Finding Collisions for Round-Reduced SM3.- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures.- Side Channel Attacks II.- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag.- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness.- Cryptographic Prools II.- Cryptanalytic Attacks on MIFARE Classic Prool.- Asynchronous Computational VSS with Reduced Communication Complexity.- Public-Key Encryption II.-Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012.- Solving BDD by Enumeration: An Update.- Identity-Based Encryption.- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.- Accountable Authority Identity-Based Encryption with Public Traceability.- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.- Symmetric Key Primitives II.- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users.- A FullyHomomorphic Cryptosystem with Approximate Perfect Secrecy.- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.
From the B&N Reads Blog

Customer Reviews