Overview
- Fast track conference proceedings
- Unique visibility
- State of the art research
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6558)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: CT-RSA 2011.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.
Similar content being viewed by others
Keywords
- authenticated key exchange
- cryptanalysis
- cryptographic protocols
- elliptic curves
- hash function
- message blinding
- oblivious transfer
- pairing
- security protocols
- side channel analysis
- simulation-based security
- systems security
- time series analysis
- untrusted hardware
- zero-knowledge
- algorithm analysis and problem complexity
Table of contents (25 papers)
-
Secure Two-Party Computation
-
Invited Talk
Other volumes
-
Topics in Cryptology – CT-RSA 2011
Editors and Affiliations
Bibliographic Information
Book Title: Topics in Cryptology -- CT-RSA 2011
Book Subtitle: The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011, Proceedings
Editors: Aggelos Kiayias
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-19074-2
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Berlin Heidelberg 2011
Softcover ISBN: 978-3-642-19073-5Published: 25 January 2011
eBook ISBN: 978-3-642-19074-2Published: 04 February 2011
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 417
Number of Illustrations: 50 b/w illustrations, 20 illustrations in colour
Topics: Cryptology, Discrete Mathematics in Computer Science, Systems and Data Security, Computer Communication Networks, Algorithm Analysis and Problem Complexity