CT-RSA B

26 papers

YearTitle / Authors
20142-Pass Key Exchange Protocols from CPA-Secure KEM.
Kaoru Kurosawa, Jun Furukawa
2014A Generic View on Trace-and-Revoke Broadcast Encryption Schemes.
Dennis Hofheinz, Christoph Striecks
2014An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl.
Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta
2014An Improved Compression Technique for Signatures Based on Learning with Errors.
Shi Bai, Steven D. Galbraith
2014Analysis of BLAKE2.
Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu
2014Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation.
Jeroen Delvaux, Ingrid Verbauwhede
2014Automatic Search for Differential Trails in ARX Ciphers.
Alex Biryukov, Vesselin Velichkov
2014Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation.
Markku-Juhani O. Saarinen
2014Broadcast Steganography.
Nelly Fazio, Antonio Nicolosi, Irippuge Milinda Perera
2014CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions.
Markku-Juhani O. Saarinen
2014Decentralized Traceable Attribute-Based Signatures.
Ali El Kaafarani, Essam Ghadafi, Dalia Khader
2014Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves.
Armando Faz-Hernández, Patrick Longa, Ana Helena Sánchez
2014Group Signatures with Message-Dependent Opening in the Standard Model.
Benoît Libert, Marc Joye
2014Hardware Implementation and Side-Channel Analysis of Lapin.
Lubos Gaspar, Gaëtan Leurent, François-Xavier Standaert
2014KDM Security in the Hybrid Framework.
Gareth T. Davies, Martijn Stam
2014Key Wrapping with a Fixed Permutation.
Dmitry Khovratovich
2014On Double Exponentiation for Securing RSA against Fault Analysis.
Duc-Phong Le, Matthieu Rivain, Chik How Tan
2014On Increasing the Throughput of Stream Ciphers.
Frederik Armknecht, Vasily Mikhalev
2014On the Practical Security of a Leakage Resilient Masking Scheme.
Emmanuel Prouff, Matthieu Rivain, Thomas Roche
2014P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures.
Qiong Huang, Duncan S. Wong, Willy Susilo
2014Practical Collision Attack on 40-Step RIPEMD-128.
Gaoli Wang
2014Practical Distributed Signatures in the Standard Model.
Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu
2014Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications.
Sherman S. M. Chow, Matthew K. Franklin, Haibin Zhang
2014Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.
Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, Brent Waters
2014The Myth of Generic DPA...and the Magic of Learning.
Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert
2014Topics in Cryptology - CT-RSA 2014 - The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings
Josh Benaloh