CT-RSA B

27 papers

YearTitle / Authors
2010Anonymity from Asymmetry: New Constructions for Anonymous HIBE.
Léo Ducas
2010Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited.
Miia Hermelin, Kaisa Nyberg
2010Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs.
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar, Malte Wienecke
2010Efficient CCA-Secure PKE from Identity-Based Techniques.
Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou
2010Efficient CRT-RSA Decryption for Small Encryption Exponents.
Subhamoy Maitra, Santanu Sarkar
2010Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries.
Nigel P. Smart
2010Fault Attacks Against emv Signatures.
Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi
2010Hash Function Combiners in TLS and SSL.
Marc Fischlin, Anja Lehmann, Daniel Wagner
2010High-Speed Parallel Software Implementation of the ηT Pairing.
Diego F. Aranha, Julio López, Darrel Hankerson
2010Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.
Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka
2010Linear Cryptanalysis of Reduced-Round PRESENT.
Joo Yeon Cho
2010Making the Diffie-Hellman Protocol Identity-Based.
Dario Fiore, Rosario Gennaro
2010On Extended Sanitizable Signature Schemes.
Sébastien Canard, Amandine Jambert
2010On Fast Verification of Hash Chains.
Dae Hyun Yum, Jin Seok Kim, Pil Joong Lee, Sung Je Hong
2010Plaintext-Awareness of Hybrid Encryption.
Shaoquan Jiang, Huaxiong Wang
2010Practical Key Recovery Attack against Secret-IV Edon-.
Gaëtan Leurent
2010Probabilistic Public Key Encryption with Equality Test.
Guomin Yang, Chik How Tan, Qiong Huang, Duncan S. Wong
2010Rebound Attacks on the Reduced Grøstl Hash Function.
Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen
2010Refinement of Miller's Algorithm Over Edwards Curves.
Lei Xu, Dongdai Lin
2010Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine.
Scott Yilek
2010Revisiting Higher-Order DPA Attacks: .
Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
2010Speed Records for NTRU.
Jens Hermans, Frederik Vercauteren, Bart Preneel
2010The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition.
Bart Preneel
2010The Sum of CBC MACs Is a Secure PRF.
Kan Yasuda
2010Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
Josef Pieprzyk
2010Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks.
Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger
2010Usable Optimistic Fair Exchange.
Alptekin Küpçü, Anna Lysyanskaya