CT-RSA B

27 papers

YearTitle / Authors
2012A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation.
Colin D. Walter
2012A First-Order Leak-Free Masking Countermeasure.
Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger
2012A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models.
Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger
2012A New Pseudorandom Generator from Collision-Resistant Hash Functions.
Alexandra Boldyreva, Virendra Kumar
2012An Efficient Protocol for Oblivious DFA Evaluation and Applications.
Payman Mohassel, Salman Niksefat, Seyed Saeed Sadeghian, Babak Sadeghiyan
2012Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism.
Amir Moradi, Markus Kasper, Christof Paar
2012Boomerang Attacks on Hash Function Using Auxiliary Differentials.
Gaëtan Leurent, Arnab Roy
2012Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation.
Manuel Barbosa, Pooya Farshim
2012Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.
Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft
2012Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption.
Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao
2012Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis.
Lejla Batina, Jip Hogenboom, Jasper G. J. van Woudenberg
2012Localized Electromagnetic Analysis of Cryptographic Implementations.
Johann Heyszl, Stefan Mangard, Benedikt Heinz, Frederic Stumpf, Georg Sigl
2012New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications.
Eiichiro Fujisaki
2012On the Joint Security of Encryption and Signature in EMV.
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler
2012Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves.
Diego F. Aranha, Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals
2012PMAC with Parity: Minimizing the Query-Length Influence.
Kan Yasuda
2012Plaintext-Checkable Encryption.
Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Fabien Laguillaumie
2012Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs.
Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede
2012Practical Realisation and Elimination of an ECC-Related Software Bug Attack.
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren
2012Reducing the Key Size of Rainbow Using Non-commutative Rings.
Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi
2012Secure Computation, I/O-Efficient Algorithms and Distributed Signatures.
Ivan Damgård, Jonas Kölker, Tomas Toft
2012Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces.
Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein
2012Short Attribute-Based Signatures for Threshold Predicates.
Javier Herranz, Fabien Laguillaumie, Benoît Libert, Carla Ràfols
2012Short Transitive Signatures for Directed Trees.
Philippe Camacho, Alejandro Hevia
2012Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings
Orr Dunkelman
2012Towards Different Flavors of Combined Side Channel Attacks.
Youssef Souissi, Shivam Bhasin, Sylvain Guilley, Maxime Nassar, Jean-Luc Danger
2012Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More.
Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro