CT-RSA B

28 papers

YearTitle / Authors
2008A Fast and Cache-Timing Resistant Implementation of the AES.
Robert Könighofer
2008A Latency-Free Election Scheme.
Kristian Gjøsteen
2008A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
Onur Aciiçmez, Werner Schindler
2008Aggregate Message Authentication Codes.
Jonathan Katz, Andrew Y. Lindell
2008An Efficient Protocol for Fair Secure Two-Party Computation.
Mehmet S. Kiraz, Berry Schoenmakers
2008Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
2008Boosting AES Performance on a Tiny Processor Core.
Stefan Tillich, Christoph Herbst
2008CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption.
Eike Kiltz, Yevgeniy Vahlis
2008Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes.
Pierre-Alain Fouque, Gaëtan Leurent
2008Efficient Fully-Simulatable Oblivious Transfer.
Andrew Y. Lindell
2008Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
2008Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework.
Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval
2008Fault Analysis Study of IDEA.
Christophe Clavier, Benedikt Gierlichs, Ingrid Verbauwhede
2008Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu
2008Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1.
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman
2008Legally-Enforceable Fairness in Secure Two-Party Computation.
Andrew Y. Lindell
2008Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks.
Praveen Gauravaram, John Kelsey
2008Online/Offline Signature Schemes for Devices with Limited Computing Capabilities.
Ping Yu, Stephen R. Tate
2008Program Obfuscation and One-Time Programs.
Shafi Goldwasser
2008Public-Key Encryption with Non-interactive Opening.
Ivan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek
2008RFID Security: Tradeoffs between Security and Efficiency.
Ivan Damgård, Michael Østergaard Pedersen
2008Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack.
Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
2008Security of NMACand HMACBased on Non-malleability.
Marc Fischlin
2008Separation Results on the "One-More" Computational Problems.
Emmanuel Bresson, Jean Monnerat, Damien Vergnaud
2008Small Secret Key Attack on a Variant of RSA (Due to Takagi).
Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa
2008Super-Efficient Verification of Dynamic Outsourced Databases.
Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos
2008Susceptibility of UHF RFID Tags to Electromagnetic Analysis.
Thomas Plos
2008Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings
Tal Malkin