CT-RSA B

26 papers

YearTitle / Authors
2007A Bit-Slice Implementation of the Whirlpool Hash Function.
Karl Scheibelhofer
2007A Practical Optimal Padding for Signature Schemes.
Haifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang
2007A Practical and Tightly Secure Signature Scheme Without Hash Function.
Benoît Chevallier-Mames, Marc Joye
2007A Simple Related-Key Attack on the Full SHACAL-1.
Eli Biham, Orr Dunkelman, Nathan Keller
2007Batch Processing of Interactive Proofs.
Koji Chida, Go Yamamoto
2007Cache Based Remote Timing Attack on the AES.
Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç
2007Compact E-Cash from Bounded Accumulator.
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
2007Cryptanalysis of Reduced Variants of the FORK-256 Hash Function.
Florian Mendel, Joseph Lano, Bart Preneel
2007Differential Power Analysis of Stream Ciphers.
Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten
2007Directed Transitive Signature Scheme.
Xun Yi
2007Efficient Password-Authenticated Key Exchange Based on RSA.
Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won
2007Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
2007How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
2007Human Identification Through Image Evaluation Using Secret Predicates.
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee
2007Identity-Based Multi-signatures from RSA.
Mihir Bellare, Gregory Neven
2007Impossibility Proofs for RSA Signatures in the Standard Model.
Pascal Paillier
2007Improved Efficiency for Private Stable Matching.
Matthew K. Franklin, Mark A. Gondree, Payman Mohassel
2007MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers.
Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
2007Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels.
Yvo Desmedt, Goce Jakimoski
2007Predicting Secret Keys Via Branch Prediction.
Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert
2007Public Key Cryptography and RFID Tags.
Máire McLoone, Matthew J. B. Robshaw
2007Second Preimages for SMASH.
Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
2007Selecting Secure Passwords.
Eric R. Verheul
2007Template Attacks on Masking - Resistance Is Futile.
Elisabeth Oswald, Stefan Mangard
2007Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls.
Joseph H. Silverman, William Whyte
2006Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings
Masayuki Abe