conf/ctrsa/ctrsa2008
Tal Malkin (Ed.)
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings
CT-RSA
Lecture Notes in Computer Science, Vol. 4964
2008
978-3-540-79262-8
Springer
Hash Function Cryptanalysis
- Yu Sasaki,
Lei Wang,
Kazuo Ohta,
Noboru Kunihiro:
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack.
1-18
http://dx.doi.org/10.1007/978-3-540-79263-5_1
- Pierre-Alain Fouque,
Gaëtan Leurent:
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes.
19-35
http://dx.doi.org/10.1007/978-3-540-79263-5_2
- Praveen Gauravaram,
John Kelsey:
Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks.
36-51
http://dx.doi.org/10.1007/978-3-540-79263-5_3
Cryptographic Building Blocks
- Andrew Y. Lindell:
Efficient Fully-Simulatable Oblivious Transfer.
52-70
http://dx.doi.org/10.1007/978-3-540-79263-5_4
- Emmanuel Bresson,
Jean Monnerat,
Damien Vergnaud:
Separation Results on the "One-More" Computational Problems.
71-87
http://dx.doi.org/10.1007/978-3-540-79263-5_5
Fairness in Secure Computation
- Mehmet S. Kiraz,
Berry Schoenmakers:
An Efficient Protocol for Fair Secure Two-Party Computation.
88-105
http://dx.doi.org/10.1007/978-3-540-79263-5_6
- Qiong Huang,
Guomin Yang,
Duncan S. Wong,
Willy Susilo:
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
106-120
http://dx.doi.org/10.1007/978-3-540-79263-5_7
- Andrew Y. Lindell:
Legally-Enforceable Fairness in Secure Two-Party Computation.
121-137
http://dx.doi.org/10.1007/978-3-540-79263-5_8
Message Authentication Codes
- Marc Fischlin:
Security of NMACand HMACBased on Non-malleability.
138-154
http://dx.doi.org/10.1007/978-3-540-79263-5_9
- Jonathan Katz,
Andrew Y. Lindell:
Aggregate Message Authentication Codes.
155-169
http://dx.doi.org/10.1007/978-3-540-79263-5_10
Improved AES Implementations
- Stefan Tillich,
Christoph Herbst:
Boosting AES Performance on a Tiny Processor Core.
170-186
http://dx.doi.org/10.1007/978-3-540-79263-5_11
- Robert Könighofer:
A Fast and Cache-Timing Resistant Implementation of the AES.
187-202
http://dx.doi.org/10.1007/978-3-540-79263-5_12
Public Key Encryption with Special Properties
- Jian Weng,
Shengli Liu,
Kefei Chen,
Dong Zheng,
Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
203-220
http://dx.doi.org/10.1007/978-3-540-79263-5_13
- Eike Kiltz,
Yevgeniy Vahlis:
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption.
221-238
http://dx.doi.org/10.1007/978-3-540-79263-5_14
- Ivan Damgård,
Dennis Hofheinz,
Eike Kiltz,
Rune Thorbek:
Public-Key Encryption with Non-interactive Opening.
239-255
http://dx.doi.org/10.1007/978-3-540-79263-5_15
Side Channel Cryptanalysis
- Onur Aciiçmez,
Werner Schindler:
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
256-273
http://dx.doi.org/10.1007/978-3-540-79263-5_16
- Christophe Clavier,
Benedikt Gierlichs,
Ingrid Verbauwhede:
Fault Analysis Study of IDEA.
274-287
http://dx.doi.org/10.1007/978-3-540-79263-5_17
- Thomas Plos:
Susceptibility of UHF RFID Tags to Electromagnetic Analysis.
288-300
http://dx.doi.org/10.1007/978-3-540-79263-5_18
Cryptography for Limited Devices
- Ping Yu,
Stephen R. Tate:
Online/Offline Signature Schemes for Devices with Limited Computing Capabilities.
301-317
http://dx.doi.org/10.1007/978-3-540-79263-5_19
- Ivan Damgård,
Michael Østergaard Pedersen:
RFID Security: Tradeoffs between Security and Efficiency.
318-332
http://dx.doi.org/10.1007/978-3-540-79263-5_20
Invited Talk
- Shafi Goldwasser:
Program Obfuscation and One-Time Programs.
333-334
http://dx.doi.org/10.1007/978-3-540-79263-5_21
Key Exchange
- Michel Abdalla,
Dario Catalano,
Céline Chevalier,
David Pointcheval:
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework.
335-351
http://dx.doi.org/10.1007/978-3-540-79263-5_22
- Stanislaw Jarecki,
Jihye Kim,
Gene Tsudik:
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
352-369
http://dx.doi.org/10.1007/978-3-540-79263-5_23
Cryptanalysis
- Jiqiang Lu,
Jongsung Kim,
Nathan Keller,
Orr Dunkelman:
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1.
370-386
http://dx.doi.org/10.1007/978-3-540-79263-5_24
- Kouichi Itoh,
Noboru Kunihiro,
Kaoru Kurosawa:
Small Secret Key Attack on a Variant of RSA (Due to Takagi).
387-406
http://dx.doi.org/10.1007/978-3-540-79263-5_25
Cryptographic Protocols
- Michael T. Goodrich,
Roberto Tamassia,
Nikos Triandopoulos:
Super-Efficient Verification of Dynamic Outsourced Databases.
407-424
http://dx.doi.org/10.1007/978-3-540-79263-5_26
- Kristian Gjøsteen:
A Latency-Free Election Scheme.
425-436
http://dx.doi.org/10.1007/978-3-540-79263-5_27