CT-RSA B

32 papers

YearTitle / Authors
2009A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model.
Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento
2009A Statistical Saturation Attack against the Block Cipher PRESENT.
Baudoin Collard, François-Xavier Standaert
2009Adaptive-ID Secure Revocable Identity-Based Encryption.
Benoît Libert, Damien Vergnaud
2009Adaptively Secure Two-Party Computation with Erasures.
Andrew Y. Lindell
2009An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.
Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
2009Attacks on the DECT Authentication Mechanisms.
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel
2009Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening.
David Galindo
2009Communication-Efficient Private Protocols for Longest Common Subsequence.
Matthew K. Franklin, Mark A. Gondree, Payman Mohassel
2009Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1.
Andrew Y. Lindell
2009Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values.
Tomas Toft
2009Cryptanalysis of CTC2.
Orr Dunkelman, Nathan Keller
2009Divisible On-Line/Off-Line Signatures.
Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang
2009Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu
2009Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags.
Thomas Plos
2009Fault Analysis Attack against an AES Prototype Chip Using RSL.
Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta
2009Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable.
Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, Louis Goubin
2009Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security.
Christophe Petit, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor
2009Key Insulation and Intrusion Resilience over a Public Channel.
Mihir Bellare, Shanshan Duan, Adriana Palacio
2009Key-Private Proxy Re-encryption.
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
2009Local Sequentiality Does Not Help for Concurrent Composition.
Andrew Y. Lindell
2009Practical Attacks on Masked Hardware.
Thomas Popp, Mario Kirschbaum, Stefan Mangard
2009Practical Short Signature Batch Verification.
Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen
2009Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients.
Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
2009Securing RSA against Fault Analysis by Double Addition Chain Exponentiation.
Matthieu Rivain
2009Short Redactable Signatures Using Random Trees.
Ee-Chien Chang, Chee Liang Lim, Jia Xu
2009Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity.
Dae Hyun Yum, Jae Woo Seo, Sungwook Eom, Pil Joong Lee
2009Speeding up Collision Search for Byte-Oriented Hash Functions.
Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic
2009Square, a New Multivariate Encryption Scheme.
Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, Ming-Shing Chen
2009Statistically Hiding Sets.
Manoj Prabhakaran, Rui Xue
2009Strengthening Security of RSA-OAEP.
Alexandra Boldyreva
2009Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings
Marc Fischlin
2009Universally Anonymous IBE Based on the Quadratic Residuosity Assumption.
Giuseppe Ateniese, Paolo Gasti