Skip to main content
  • Conference proceedings
  • © 2013

Topics in Cryptology - CT- RSA 2013

The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings

Editors:

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7779)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CT-RSA: Cryptographers’ Track at the RSA Conference

Conference proceedings info: CT-RSA 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Side Channel Attacks I

    1. Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations

      • AurĂ©lie Bauer, Eliane Jaulmes, Emmanuel Prouff, Justine Wild
      Pages 1-17
    2. Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL

      • Cyril Arnaud, Pierre-Alain Fouque
      Pages 18-33
  3. Digital Signatures I

    1. Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures

      • Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng, San Ling et al.
      Pages 50-67
  4. Public-Key Encryption I

  5. Cryptographic Protocols I

    1. Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

      • Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering
      Pages 101-114
    2. Randomized Partial Checking Revisited

      • Shahram Khazaei, Douglas Wikström
      Pages 115-128
  6. Secure Implementation Methods

    1. Randomly Failed! The State of Randomness in Current Java Implementations

      • Kai Michaelis, Christopher Meyer, Jörg Schwenk
      Pages 129-144
    2. Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl

      • Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald et al.
      Pages 145-161
  7. Symmetric Key Primitives I

    1. Collisions for the WIDEA-8 Compression Function

      • Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varıcı
      Pages 162-173
    2. Finding Collisions for Round-Reduced SM3

      • Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 174-188
    3. Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures

      • Stanislav Bulygin, Michael Walter, Johannes Buchmann
      Pages 189-206
  8. Side Channel Attacks II

  9. Cryptographic Protocols II

    1. Cryptanalytic Attacks on MIFARE Classic Protocol

      • Jovan Dj. Golić
      Pages 239-258
    2. Asynchronous Computational VSS with Reduced Communication Complexity

      • Michael Backes, Amit Datta, Aniket Kate
      Pages 259-276
  10. Public-Key Encryption II

    1. Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012

      • Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
      Pages 277-292
    2. Solving BDD by Enumeration: An Update

      • Mingjie Liu, Phong Q. Nguyen
      Pages 293-309

Other Volumes

  1. Topics in Cryptology – CT-RSA 2013

About this book

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

Editors and Affiliations

  • Institute for Future Enviroments, Queensland University of Technology, Brisbane, Australia

    Ed Dawson

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access