CT-RSA B

27 papers

YearTitle / Authors
2018An Exposure Model for Supersingular Isogeny Diffie-Hellman Key Exchange.
Brian Koziel, Reza Azarderakhsh, David Jao
2018Asynchronous Provably-Secure Hidden Services.
Philippe Camacho, Fernando Krell
2018Breaking Ed25519 in WolfSSL.
Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella
2018Composable and Robust Outsourced Storage.
Christian Badertscher, Ueli Maurer
2018Count-then-Permute: A Precision-Free Alternative to Inversion Sampling.
Kazuhiko Minematsu, Kentarou Sasaki, Yuki Tanaka
2018Cryptanalysis Against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations.
Akinori Hosoyamada, Yu Sasaki
2018Cryptanalysis of Compact-LWE.
Jonathan Bootle, Mehdi Tibouchi, Keita Xagawa
2018Differential Attacks on Deterministic Signatures.
Christopher Ambrose, Joppe W. Bos, Björn Fay, Marc Joye, Manfred Lochter, Bruce Murray
2018High-Precision Arithmetic in Homomorphic Encryption.
Hao Chen, Kim Laine, Rachel Player, Yuhou Xia
2018High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And an Improved Construction.
Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl
2018Improved Factorization of N=p^rq^s.
Jean-Sébastien Coron, Rina Zeitoun
2018Improved Security Bound of LightMAC_Plus and Its Single-Key Variant.
Yusuke Naito
2018Improving Stateless Hash-Based Signatures.
Jean-Philippe Aumasson, Guillaume Endignoux
2018MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX.
Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar
2018MixColumns Properties and Attacks on (Round-Reduced) AES with a Single Secret S-Box.
Lorenzo Grassi
2018Practical Revocation and Key Rotation.
Steven A. Myers, Adam Shull
2018Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.
Johannes Blömer, Fabian Eidens, Jakob Juhnke
2018Reassessing Security of Randomizable Signatures.
David Pointcheval, Olivier Sanders
2018Regularly Lossy Functions and Applications.
Yu Chen, Baodong Qin, Haiyang Xue
2018Revocable Identity-Based Encryption from Codes with Rank Metric.
Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya
2018Secure Deduplication of Encrypted Data: Refined Model and New Constructions.
Jian Liu, Li Duan, Yong Li, N. Asokan
2018Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons.
Rhys Carlton, Aleksander Essex, Krzysztof Kapulkin
2018Topics in Cryptology - CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings
Nigel P. Smart
2018Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited.
Daniel P. Martin, Luke Mather, Elisabeth Oswald
2018Two-Message Key Exchange with Strong Security from Ideal Lattices.
Zheng Yang, Yu Chen, Song Luo
2018Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability.
Martin Ukrop, Vashek Matyas
2018Zero-Sum Partitions of PHOTON Permutations.
Qingju Wang, Lorenzo Grassi, Christian Rechberger