CT-RSA B

26 papers

YearTitle / Authors
2017A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks.
Liron David, Avishai Wool
2017A Tool Kit for Partial Key Exposure Attacks on RSA.
Atsushi Takayasu, Noboru Kunihiro
2017Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection.
Michele Orrù, Emmanuela Orsini, Peter Scholl
2017An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order.
Hannes Groß, Stefan Mangard, Thomas Korak
2017Choosing Parameters for NTRUEncrypt.
Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang
2017Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks.
Dingding Jia, Xianhui Lu, Bao Li
2017Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves.
Marc Joye, Benoît Libert
2017Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme.
Jakub Breier, Xiaolu Hou
2017Full Disk Encryption: Bridging Theory and Practice.
Louiza Khati, Nicky Mouha, Damien Vergnaud
2017Gauss Sieve Algorithm on GPUs.
Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, Chen-Mou Cheng
2017Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware.
Pascal Sasdrich, Amir Moradi, Tim Güneysu
2017Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC.
Christoph Dobraunig, Eik List
2017Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise.
Noboru Kunihiro, Yuki Takahashi
2017Low-Leakage Secure Search for Boolean Expressions.
Fernando Krell, Gabriela F. Ciocarlie, Ashish Gehani, Mariana Raykova
2017My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses.
Si Gao, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma
2017New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.
Yohei Watanabe, Keita Emura, Jae Hong Seo
2017On the Entropy of Oscillator-Based True Random Number Generators.
Yuan Ma, Jingqiang Lin, Jiwu Jing
2017Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World.
Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook
2017Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin.
Ren Zhang, Bart Preneel
2017Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption.
Eik List, Mridul Nandi
2017Ridge-Based Profiled Differential Power Analysis.
Weijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang
2017Surnaming Schemes, Fast Verification, and Applications to SGX Technology.
Dan Boneh, Shay Gueron
2017Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers.
Praveen Kumar Vadnala
2017Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings
Helena Handschuh
2017WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction.
Jihoon Cho, Kyu Young Choi, Itai Dinur, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg
2017Weak Keys for AEZ, and the External Key Padding Attack.
Bart Mennink