CT-RSA B

27 papers

YearTitle / Authors
2015A Simple and Improved Algorithm for Integer Factorization with Implicit Hints.
Koji Nuida, Naoto Itakura, Kaoru Kurosawa
2015Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows.
Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
2015Cache Storage Attacks.
Billy Bob Brumley
2015Cold Boot Attacks in the Discrete Logarithm Setting.
Bertram Poettering, Dale L. Sibborn
2015Communication Optimal Tardos-Based Asymmetric Fingerprinting.
Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang
2015Completeness of Single-Bit Projection-KDM Security for Public Key Encryption.
Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
2015Cryptanalysis of Ascon.
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
2015Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings.
Nuttapong Attrapadung, Shota Yamada
2015Efficient Leakage Resilient Circuit Compilers.
Marcin Andrychowicz, Ivan Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou
2015Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace.
Neil Hanley, HeeSeok Kim, Michael Tunstall
2015Finding Shortest Lattice Vectors in the Presence of Gaps.
Wei Wei, Mingjie Liu, Xiaoyun Wang
2015Format Oracles on OpenPGP.
Florian Maury, Jean-René Reinhard, Olivier Levillain, Henri Gilbert
2015Hash Functions from Defective Ideal Ciphers.
Jonathan Katz, Stefan Lucks, Aishwarya Thiruvengadam
2015Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON.
Junwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu
2015How to Incorporate Associated Data in Sponge-Based Authenticated Encryption.
Yu Sasaki, Kan Yasuda
2015Implementing GCM on ARMv8.
Conrado Porto Lopes Gouvêa, Julio López
2015Improved Attacks on Reduced-Round Camellia-128/192/256.
Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
2015Just a Little Bit More.
Joop van de Pol, Nigel P. Smart, Yuval Yarom
2015Linearly Homomorphic Encryption from $$\mathsf {DDH}$$.
Guilhem Castagnos, Fabien Laguillaumie
2015Non-Interactive Zero-Knowledge Proofs of Non-Membership.
Olivier Blazy, Céline Chevalier, Damien Vergnaud
2015Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation.
Handan Kilinç, Alptekin Küpçü
2015Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption.
Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
2015Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives.
David Derler, Christian Hanser, Daniel Slamanig
2015Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts.
Jae Hong Seo, Keita Emura
2015Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions.
Essam Ghadafi
2015Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings
Kaisa Nyberg
2015Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication.
Yusi Zhang