Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings / Edition 1

Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings / Edition 1

by Josef Pieprzyk
ISBN-10:
3642119247
ISBN-13:
9783642119248
Pub. Date:
04/08/2010
Publisher:
Springer Berlin Heidelberg
ISBN-10:
3642119247
ISBN-13:
9783642119248
Pub. Date:
04/08/2010
Publisher:
Springer Berlin Heidelberg
Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings / Edition 1

Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings / Edition 1

by Josef Pieprzyk

Paperback

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.


Overview

The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf- ence has included an academic Cryptographers'Track (CT-RSA). This year was the 10th anniversary of CT-RSA. Since its conception, the CT-RSA conference has become a major avenue for publishing high-quality research papers. The RSA conference was held in San Francisco, California, during March 1-5, 2010. This year we received94 submissions. Eachpaper gotassignedto three ref- ees. Papers submitted by the members of the Program Committee got assigned to?vereferees.Inthe?rststageofthereviewprocess, thesubmittedpaperswere read and evaluated by the ProgramCommittee members and then in the second stage, the papers were scrutinized during an extensive discussion. Finally, the Program Committee chose 25 papers to be included in the conference program. The authors of the accepted papers had two weeks for revision and preparation of ?nal versions.The revised papers were not subject to editorial review and the authors bear full responsibility for their contents. The submission and review process was supported by the iChair conference submission server. We thank Matthiew Finiasz and Thomas Baig&ngrave; eres for letting us use iChair. The conf- ence proceedings were published by Springer in this volume of Lecture Notes in Computer Science.

Product Details

ISBN-13: 9783642119248
Publisher: Springer Berlin Heidelberg
Publication date: 04/08/2010
Series: Lecture Notes in Computer Science , #5985
Edition description: 2010
Pages: 400
Product dimensions: 6.00(w) x 9.20(h) x 0.90(d)

Table of Contents

Invited Talk

The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition Bart Preneel 1

Public-Key Cryptography

Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries Nigel P. Smart 15

Efficient CRT-RSA Decryption for Small Encryption Exponents Subhamoy Maitra Santanu Sarkar 26

Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine Scott Yilek 41

Plaintext-Awareness of Hybrid Encryption Shaoquan Jiang Huaxiong Wang 57

Speed Records for NTRU Jens Hermans Frederik Vercauteren Bart Preneel 73

High-Speed Parallel Software Implementation of the ητ Pairing Diego F. Aranha Julio López Darrel Hankerson 89

Refinement of Miller's Algorithm Over Edwards Curves Lei Xu Dongdai Lin 106

Probabilistic Public Key Encryption with Equality Test Guomin Yang Chik How Tan Qiong Huang Duncan S. Wong 119

Efficient CCA-Secure PKE from Identity-Based Techniques Junzuo Lai Robert H. Deng Shengli Liu Weidong Kou 132

Anonymity from Asymmetry: New Constructions for Anonymous HIBE Léo Ducas 148

Making the Diffie-Hellman Protocol Identity-Based Dario Fiore Rosario Gennaro 165

On Extended Sanitizable Signature Schemes Sébastien Canard Amandine Jambert 179

Side-Channel Attacks

Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks Shivam Bhasin Sylvain Guilley Laurent Sauvage Jean-Luc Danger 195

Fault Attacks Against EMV Signatures Jean-Sébastien Coron David Naccache Mehdi Tibouchi 208

Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis Benedikt Gierlichs Lejla Batina Bart Preneel Ingrid Verbauwhede 221

Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs Andrey Bogdanov Thomas Eisenbarth Christof Paar Malte Wienecke 235

Cryptographic Protocols

Usable Optimistic Fair Exchange Alptekin Küpçü Anna Lysyanskaya 252

Hash Function Combiners in TLS and SSL Marc Fischlin Anja Lehmann Daniel Wagner 268

Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness Bagus Santoso Kazuo Ohta Kazuo Sakiyama Goichiro Hanaoka 284

Cryptanalysis

Linear Cryptanalysis of Reduced-Round PRESENT Joo Yeon Cho 302

Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited Miia Hermelin Kaisa Nyberg 318

Practical Key Recovery Attack against Secret-IV Edon-R Gaëtan Leurent 334

Rebound Attacks on the Reduced Grøstl Hash Function Florian Mendel Christian Rechberger Martin Schläffer Søren S. Thomsen 350

Symmetric Cryptography

The Sum of CBC MACs Is a Secure PRF Kan Yasuda 366

On Fast Verification of Hash Chains Dae Hyun Yum Jin Seok Kim Pil Joong Lee Sung Je Hong 382

Author Index 397

From the B&N Reads Blog

Customer Reviews