CT-RSA B

27 papers

YearTitle / Authors
2016Constrained PRFs for Unbounded Inputs.
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak
2016Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes.
Johannes Blömer, Gennadij Liske
2016Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014.
Yanbin Pan
2016Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption.
Sebastian Gajek
2016ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs.
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
2016Efficient Concurrent Covert Computation of String Equality and Set Intersection.
Chongwon Cho, Dana Dachman-Soled, Stanislaw Jarecki
2016Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles.
Prastudy Fauzi, Helger Lipmaa
2016Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability.
Peter Pessl, Stefan Mangard
2016Factoring N=p^rq^s for Large r and s.
Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun
2016From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila
2016Hybrid Publicly Verifiable Computation.
James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2016INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes.
Avik Chakraborti, Nilanjan Datta, Mridul Nandi
2016Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions.
Olivier Blazy, Céline Chevalier, Damien Vergnaud
2016NFLlib: NTT-Based Fast Lattice Library.
Carlos Aguilar Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint
2016New Observations on Piccolo Block Cipher.
Yanfeng Wang, Wenling Wu
2016Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability.
Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer
2016Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling.
Zhen Li
2016Private Large-Scale Databases with Distributed Searchable Symmetric Encryption.
Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
2016Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC.
Yusuke Naito, Lei Wang
2016Secure Audit Logs with Verifiable Excerpts.
Gunnar Hartung
2016Short Randomizable Signatures.
David Pointcheval, Olivier Sanders
2016Short Structure-Preserving Signatures.
Essam Ghadafi
2016Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones.
Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi
2016Strongly Leakage-Resilient Authenticated Key Exchange.
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
2016Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings
Kazue Sako
2016Towards a Unified Security Model for Physically Unclonable Functions.
Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung
2016Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
Ana Costache, Nigel P. Smart