Skip to main content
  • Conference proceedings
  • © 2016

Topics in Cryptology - CT-RSA 2016

The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9610)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CT-RSA: Cryptographers’ Track at the RSA Conference

Conference proceedings info: CT-RSA 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

    Pages I-XI
  2. Secure Key Exchange Schemes

    1. Front Matter

      Pages 1-1
    2. Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions

      • Olivier Blazy, CĂ©line Chevalier, Damien Vergnaud
      Pages 3-18
    3. Strongly Leakage-Resilient Authenticated Key Exchange

      • Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo
      Pages 19-36
  3. Authenticated Encryption

    1. Front Matter

      Pages 37-37
    2. INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes

      • Avik Chakraborti, Nilanjan Datta, Mridul Nandi
      Pages 39-54
    3. From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS

      • Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila
      Pages 55-71
  4. Searchable Symmetric Encryption

    1. Front Matter

      Pages 73-73
    2. Private Large-Scale Databases with Distributed Searchable Symmetric Encryption

      • Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
      Pages 90-107
  5. Digital Signatures with New Functionality

    1. Front Matter

      Pages 109-109
    2. Short Randomizable Signatures

      • David Pointcheval, Olivier Sanders
      Pages 111-126
    3. Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability

      • Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer
      Pages 127-143
  6. Secure Multi Party Computation

    1. Front Matter

      Pages 145-145
    2. Hybrid Publicly Verifiable Computation

      • James Alderman, Christian Janson, Carlos Cid, Jason Crampton
      Pages 147-163
    3. Efficient Concurrent Covert Computation of String Equality and Set Intersection

      • Chongwon Cho, Dana Dachman-Soled, StanisĹ‚aw Jarecki
      Pages 164-179
  7. How to Verify Procedures

    1. Front Matter

      Pages 181-181
    2. Secure Audit Logs with Verifiable Excerpts

      • Gunnar Hartung
      Pages 183-199
    3. Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles

      • Prastudy Fauzi, Helger Lipmaa
      Pages 200-216
  8. Side-Channel Attacks on Elliptic Curve Cryptography

    1. Front Matter

      Pages 217-217

Other Volumes

  1. Topics in Cryptology - CT-RSA 2016

About this book

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016.

The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.

Editors and Affiliations

  • NEC Cloud Systems Research Laboratories, Kawasaki, Japan

    Kazue Sako

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access