CT-RSA B

26 papers

YearTitle / Authors
2013A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy.
Michal Hojsík, Veronika Pulpánová
2013A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption.
Yannick Seurin, Joana Treger
2013Accountable Authority Identity-Based Encryption with Public Traceability.
Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng
2013Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag.
Thomas Korak, Thomas Plos
2013Asynchronous Computational VSS with Reduced Communication Complexity.
Michael Backes, Amit Datta, Aniket Kate
2013Collisions for the WIDEA-8 Compression Function.
Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici
2013Cryptanalytic Attacks on MIFARE Classic Protocol.
Jovan Dj. Golic
2013Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.
Jae Hong Seo, Keita Emura
2013Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.
Shengli Liu, Jian Weng, Yunlei Zhao
2013Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl.
Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald, Wolfgang Wieser
2013Fair Exchange of Short Signatures without Trusted Third Party.
Philippe Camacho
2013Finding Collisions for Round-Reduced SM3.
Florian Mendel, Tomislav Nad, Martin Schläffer
2013Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling, Huaxiong Wang
2013Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.
Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild
2013Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures.
Stanislav Bulygin, Michael Walter, Johannes Buchmann
2013Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness.
Yu Yu, François-Xavier Standaert
2013Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012.
Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
2013Randomized Partial Checking Revisited.
Shahram Khazaei, Douglas Wikström
2013Randomly Failed! The State of Randomness in Current Java Implementations.
Kai Michaelis, Christopher Meyer, Jörg Schwenk
2013Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes.
Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
2013Solving BDD by Enumeration: An Update.
Mingjie Liu, Phong Q. Nguyen
2013The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users.
Mike Bond, George French, Nigel P. Smart, Gaven J. Watson
2013The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.
Karyn Benson, Hovav Shacham, Brent Waters
2013Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL.
Cyril Arnaud, Pierre-Alain Fouque
2013Topics in Cryptology - CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings
Ed Dawson
2013Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.
Jiqiang Lu, Wun-She Yap, Yongzhuang Wei