Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Topics in Cryptology -- CT-RSA 2006 - The Cryptographers' Track at the RSA Conference 2006, San

Topics in Cryptology -- CT-RSA 2006

The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings

Pointcheval, David (Ed.)

2006, XI, 365 p. Also available online.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-3-540-32648-9

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-540-31033-4

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2006, CT-RSA 2006, held in San Jose, CA, USA in February 2006.

The 22 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on attacks on AES, identification, algebra, integrity, public key encryption, signatures, side-channel attacks, CCA encryption, message authentication, block ciphers, and multi-party computation.

Content Level » Research

Keywords » AES - CCA encryption - DES - Message Authentication Code - Oracle - RSA - authentication - block ciphers - communication - cryptanalysis - cryptographic protocols - cryptology - data security - information security - security

Related subjects » Communication Networks - Security and Cryptology - Software Engineering - Theoretical Computer Science

Table of contents 

Attacks on AES.- Cache Attacks and Countermeasures: The Case of AES.- Related-Key Impossible Differential Attacks on 8-Round AES-192.- Identification.- Session Corruption Attack and Improvements on Encryption Based MT-Authenticators.- Fair Identification.- Algebra.- Efficient Doubling on Genus 3 Curves over Binary Fields.- Another Look at Small RSA Exponents.- Integrity.- Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing.- RFID-Tags for Anti-counterfeiting.- Public Key Encryption.- A “Medium-Field” Multivariate Public-Key Encryption Scheme.- A New Security Proof for Damgård’s ElGamal.- Signatures.- Stand-Alone and Setup-Free Verifiably Committed Signatures.- Toward the Fair Anonymous Signatures: Deniable Ring Signatures.- Side-Channel Attacks.- Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers.- Higher Order Masking of the AES.- CCA Encryption.- Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.- How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack.- Message Authentication.- On the (Im)possibility of Blind Message Authentication Codes.- An Optimal Non-interactive Message Authentication Protocol.- Block Ciphers.- A New Criterion for Nonlinearity of Block Ciphers.- Block Ciphers Sensitive to Gröbner Basis Attacks.- Multi-party Computation.- Universally Composable Oblivious Transfer in the Multi-party Setting.- A Round and Communication Efficient Secure Ranking Protocol.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Encryption.