default search action
CT-RSA 2006: San Jose, CA, USA
- David Pointcheval:
Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings. Lecture Notes in Computer Science 3860, Springer 2006, ISBN 3-540-31033-9
Attacks on AES
- Dag Arne Osvik, Adi Shamir, Eran Tromer:
Cache Attacks and Countermeasures: The Case of AES. 1-20 - Eli Biham, Orr Dunkelman, Nathan Keller:
Related-Key Impossible Differential Attacks on 8-Round AES-192. 21-33
Identification
- Xiaojian Tian, Duncan S. Wong:
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. 34-51 - Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater:
Fair Identification. 52-63
Algebra
- Xinxin Fan, Thomas J. Wollinger, Yumin Wang:
Efficient Doubling on Genus 3 Curves over Binary Fields. 64-81 - M. Jason Hinek:
Another Look at Small RSA Exponents. 82-98
Integrity
- Michael Szydlo, Yiqun Lisa Yin:
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. 99-114 - Pim Tuyls, Lejla Batina:
RFID-Tags for Anti-counterfeiting. 115-131
Public Key Encryption
- Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu, Feipei Lai:
A "Medium-Field" Multivariate Public-Key Encryption Scheme. 132-149 - Kristian Gjøsteen:
A New Security Proof for Damgård's ElGamal. 150-158
Signatures
- Huafei Zhu, Feng Bao:
Stand-Alone and Setup-Free Verifiably Committed Signatures. 159-173 - Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura:
Toward the Fair Anonymous Signatures: Deniable Ring Signatures. 174-191
Side-Channel Attacks
- Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich:
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. 192-207 - Kai Schramm, Christof Paar:
Higher Order Masking of the AES. 208-225
CCA Encryption
- Dan Boneh, Xavier Boyen, Shai Halevi:
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. 226-243 - Yitao Duan, John F. Canny:
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. 244-261
Message Authentication
- Michel Abdalla, Chanathip Namprempre, Gregory Neven:
On the (Im)possibility of Blind Message Authentication Codes. 262-279 - Sylvain Pasini, Serge Vaudenay:
An Optimal Non-interactive Message Authentication Protocol. 280-294
Block Ciphers
- Orr Dunkelman, Nathan Keller:
A New Criterion for Nonlinearity of Block Ciphers. 295-312 - Johannes Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann:
Block Ciphers Sensitive to Gröbner Basis Attacks. 313-331
Multi-party Computation
- Marc Fischlin:
Universally Composable Oblivious Transfer in the Multi-party Setting. 332-349 - Shaoquan Jiang, Guang Gong:
A Round and Communication Efficient Secure Ranking Protocol. 350-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.