Skip to main content
  • Conference proceedings
  • © 2006

Topics in Cryptology – CT-RSA 2007

The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4377)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CT-RSA: Cryptographers’ Track at the RSA Conference

Conference proceedings info: CT-RSA 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Symmetric-Key Encryption

    1. MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers

      • Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
      Pages 1-19
    2. A Simple Related-Key Attack on the Full SHACAL-1

      • Eli Biham, Orr Dunkelman, Nathan Keller
      Pages 20-30
  3. Signatures and Authentication

    1. Selecting Secure Passwords

      • Eric R. Verheul
      Pages 49-66
    2. Human Identification Through Image Evaluation Using Secret Predicates

      • Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee
      Pages 67-84
  4. Hash Functions

    1. Cryptanalysis of Reduced Variants of the FORK-256 Hash Function

      • Florian Mendel, Joseph Lano, Bart Preneel
      Pages 85-100
    2. Second Preimages for SMASH

      • Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
      Pages 101-111
  5. Digital Signatures (I)

    1. A Practical Optimal Padding for Signature Schemes

      • Haifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang
      Pages 112-128
    2. Identity-Based Multi-signatures from RSA

      • Mihir Bellare, Gregory Neven
      Pages 145-162
  6. Cryptographic Protocols (I)

    1. Improved Efficiency for Private Stable Matching

      • Matthew Franklin, Mark Gondree, Payman Mohassel
      Pages 163-177
    2. Compact E-Cash from Bounded Accumulator

      • Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
      Pages 178-195
    3. Batch Processing of Interactive Proofs

      • Koji Chida, Go Yamamoto
      Pages 196-207
  7. Side-Channel Attacks (I)

    1. Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls

      • Joseph H. Silverman, William Whyte
      Pages 208-224
    2. Predicting Secret Keys Via Branch Prediction

      • Onur Acıiçmez, Çetin Kaya Koç, Jean-Pierre Seifert
      Pages 225-242
  8. Side-Channel Attacks (II)

    1. Template Attacks on Masking—Resistance Is Futile

      • Elisabeth Oswald, Stefan Mangard
      Pages 243-256
    2. Differential Power Analysis of Stream Ciphers

      • W. Fischer, B. M. Gammel, O. Kniffler, J. Velten
      Pages 257-270
    3. Cache Based Remote Timing Attack on the AES

      • Onur Acıiçmez, Werner Schindler, Çetin K. Koç
      Pages 271-286
  9. Cryptographic Protocols (II)

    1. Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement

      • Stanisław Jarecki, Jihye Kim, Gene Tsudik
      Pages 287-308

Other Volumes

  1. Topics in Cryptology – CT-RSA 2007

About this book

The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security event of the year. The Cryptographers’ Track (CT- RSA) is a research conference within the RSA Conference. Starting in 2001, CT-RSA continues to its seventh year and is now regarded as one of the major regularly staged event for presenting the results of cryptographic research to a wide variety of audiences. The proceedings of CT-RSA 2007 contain 25 papers selected from 73 s- missions which cover all the topics of cryptography. All the submissions were reviewed by at least three reviewers, which was possible by the hard work of 23 Program Committee members and many external reviewers listed in the foll- ing pages. The papers were selected as a result of conscientious discussion. The program includes two invited talks, by Michel Rabin and Andrew Odlyzko. I would like to express my gratitude to the Program Committee members, whowereenthusiasticfromtheverybeginningofthis completedproject.Thanks also to the external reviewers including those who completed urgent reviews during the discussion phase. Special thanks to Shai Halevi for providing and maintaining the Web review system. Finally, I would like to thank Burt Kaliski of RSA Laboratories and the Steering Committee for their suggestions and c- tinuous assistance.

Editors and Affiliations

  • Information Sharing Platform Laboratories, NTT Corporation, Japan

    Masayuki Abe

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access