conf/ctrsa/ctrsa2008 Tal Malkin (Ed.) Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings CT-RSA Lecture Notes in Computer Science, Vol. 4964 2008 978-3-540-79262-8 Springer <h2>Hash Function Cryptanalysis</h2> <ul> <li>Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro: Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. 1-18 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_1</ee> <li>Pierre-Alain Fouque, Gaëtan Leurent: Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. 19-35 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_2</ee> <li>Praveen Gauravaram, John Kelsey: Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. 36-51 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_3</ee> </ul> <h2>Cryptographic Building Blocks</h2> <ul> <li>Andrew Y. Lindell: Efficient Fully-Simulatable Oblivious Transfer. 52-70 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_4</ee> <li>Emmanuel Bresson, Jean Monnerat, Damien Vergnaud: Separation Results on the "One-More" Computational Problems. 71-87 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_5</ee> </ul> <h2>Fairness in Secure Computation</h2> <ul> <li>Mehmet S. Kiraz, Berry Schoenmakers: An Efficient Protocol for Fair Secure Two-Party Computation. 88-105 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_6</ee> <li>Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. 106-120 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_7</ee> <li>Andrew Y. Lindell: Legally-Enforceable Fairness in Secure Two-Party Computation. 121-137 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_8</ee> </ul> <h2>Message Authentication Codes</h2> <ul> <li>Marc Fischlin: Security of NMACand HMACBased on Non-malleability. 138-154 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_9</ee> <li>Jonathan Katz, Andrew Y. Lindell: Aggregate Message Authentication Codes. 155-169 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_10</ee> </ul> <h2>Improved AES Implementations</h2> <ul> <li>Stefan Tillich, Christoph Herbst: Boosting AES Performance on a Tiny Processor Core. 170-186 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_11</ee> <li>Robert Könighofer: A Fast and Cache-Timing Resistant Implementation of the AES. 187-202 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_12</ee> </ul> <h2>Public Key Encryption with Special Properties</h2> <ul> <li>Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu: Identity-Based Threshold Key-Insulated Encryption without Random Oracles. 203-220 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_13</ee> <li>Eike Kiltz, Yevgeniy Vahlis: CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. 221-238 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_14</ee> <li>Ivan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek: Public-Key Encryption with Non-interactive Opening. 239-255 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_15</ee> </ul> <h2>Side Channel Cryptanalysis</h2> <ul> <li>Onur Aciiçmez, Werner Schindler: A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. 256-273 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_16</ee> <li>Christophe Clavier, Benedikt Gierlichs, Ingrid Verbauwhede: Fault Analysis Study of IDEA. 274-287 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_17</ee> <li>Thomas Plos: Susceptibility of UHF RFID Tags to Electromagnetic Analysis. 288-300 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_18</ee> </ul> <h2>Cryptography for Limited Devices</h2> <ul> <li>Ping Yu, Stephen R. Tate: Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. 301-317 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_19</ee> <li>Ivan Damgård, Michael Østergaard Pedersen: RFID Security: Tradeoffs between Security and Efficiency. 318-332 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_20</ee> </ul> <h2>Invited Talk</h2> <ul> <li>Shafi Goldwasser: Program Obfuscation and One-Time Programs. 333-334 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_21</ee> </ul> <h2>Key Exchange</h2> <ul> <li>Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval: Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. 335-351 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_22</ee> <li>Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. 352-369 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_23</ee> </ul> <h2>Cryptanalysis</h2> <ul> <li>Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman: Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. 370-386 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_24</ee> <li>Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa: Small Secret Key Attack on a Variant of RSA (Due to Takagi). 387-406 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_25</ee> </ul> <h2>Cryptographic Protocols</h2> <ul> <li>Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos: Super-Efficient Verification of Dynamic Outsourced Databases. 407-424 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_26</ee> <li>Kristian Gjøsteen: A Latency-Free Election Scheme. 425-436 <ee>http://dx.doi.org/10.1007/978-3-540-79263-5_27</ee> </ul> <footer>