conf/ctrsa/ctrsa2008


Tal Malkin (Ed.)
Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings
CT-RSA
Lecture Notes in Computer Science, Vol. 4964
2008
978-3-540-79262-8
Springer

<h2>Hash Function Cryptanalysis</h2>
<ul>
<li>Yu Sasaki,
Lei Wang,
Kazuo Ohta,
Noboru Kunihiro:
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack.
1-18
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_1</ee>
<li>Pierre-Alain Fouque,
Ga&euml;tan Leurent:
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes.
19-35
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_2</ee>
<li>Praveen Gauravaram,
John Kelsey:
Linear-XOR and Additive Checksums Don't Protect Damg&aring;rd-Merkle Hashes from Generic Attacks.
36-51
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_3</ee>
</ul>

<h2>Cryptographic Building Blocks</h2>
<ul>
<li>Andrew Y. Lindell:
Efficient Fully-Simulatable Oblivious Transfer.
52-70
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_4</ee>
<li>Emmanuel Bresson,
Jean Monnerat,
Damien Vergnaud:
Separation Results on the "One-More" Computational Problems.
71-87
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_5</ee>
</ul>

<h2>Fairness in Secure Computation</h2>
<ul>
<li>Mehmet S. Kiraz,
Berry Schoenmakers:
An Efficient Protocol for Fair Secure Two-Party Computation.
88-105
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_6</ee>
<li>Qiong Huang,
Guomin Yang,
Duncan S. Wong,
Willy Susilo:
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
106-120
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_7</ee>
<li>Andrew Y. Lindell:
Legally-Enforceable Fairness in Secure Two-Party Computation.
121-137
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_8</ee>
</ul>

<h2>Message Authentication Codes</h2>
<ul>
<li>Marc Fischlin:
Security of NMACand HMACBased on Non-malleability.
138-154
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_9</ee>
<li>Jonathan Katz,
Andrew Y. Lindell:
Aggregate Message Authentication Codes.
155-169
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_10</ee>
</ul>

<h2>Improved AES Implementations</h2>
<ul>
<li>Stefan Tillich,
Christoph Herbst:
Boosting AES Performance on a Tiny Processor Core.
170-186
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_11</ee>
<li>Robert K&ouml;nighofer:
A Fast and Cache-Timing Resistant Implementation of the AES.
187-202
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_12</ee>
</ul>

<h2>Public Key Encryption with Special Properties</h2>
<ul>
<li>Jian Weng,
Shengli Liu,
Kefei Chen,
Dong Zheng,
Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
203-220
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_13</ee>
<li>Eike Kiltz,
Yevgeniy Vahlis:
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption.
221-238
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_14</ee>
<li>Ivan Damg&aring;rd,
Dennis Hofheinz,
Eike Kiltz,
Rune Thorbek:
Public-Key Encryption with Non-interactive Opening.
239-255
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_15</ee>
</ul>

<h2>Side Channel Cryptanalysis</h2>
<ul>
<li>Onur Acii&ccedil;mez,
Werner Schindler:
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
256-273
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_16</ee>
<li>Christophe Clavier,
Benedikt Gierlichs,
Ingrid Verbauwhede:
Fault Analysis Study of IDEA.
274-287
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_17</ee>
<li>Thomas Plos:
Susceptibility of UHF RFID Tags to Electromagnetic Analysis.
288-300
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_18</ee>
</ul>

<h2>Cryptography for Limited Devices</h2>
<ul>
<li>Ping Yu,
Stephen R. Tate:
Online/Offline Signature Schemes for Devices with Limited Computing Capabilities.
301-317
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_19</ee>
<li>Ivan Damg&aring;rd,
Michael &Oslash;stergaard Pedersen:
RFID Security: Tradeoffs between Security and Efficiency.
318-332
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_20</ee>
</ul>

<h2>Invited Talk</h2>
<ul>
<li>Shafi Goldwasser:
Program Obfuscation and One-Time Programs.
333-334
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_21</ee>
</ul>

<h2>Key Exchange</h2>
<ul>
<li>Michel Abdalla,
Dario Catalano,
C&eacute;line Chevalier,
David Pointcheval:
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework.
335-351
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_22</ee>
<li>Stanislaw Jarecki,
Jihye Kim,
Gene Tsudik:
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
352-369
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_23</ee>
</ul>

<h2>Cryptanalysis</h2>
<ul>
<li>Jiqiang Lu,
Jongsung Kim,
Nathan Keller,
Orr Dunkelman:
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1.
370-386
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_24</ee>
<li>Kouichi Itoh,
Noboru Kunihiro,
Kaoru Kurosawa:
Small Secret Key Attack on a Variant of RSA (Due to Takagi).
387-406
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_25</ee>
</ul>

<h2>Cryptographic Protocols</h2>
<ul>
<li>Michael T. Goodrich,
Roberto Tamassia,
Nikos Triandopoulos:
Super-Efficient Verification of Dynamic Outsourced Databases.
407-424
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_26</ee>
<li>Kristian Gj&oslash;steen:
A Latency-Free Election Scheme.
425-436
<ee>http://dx.doi.org/10.1007/978-3-540-79263-5_27</ee>
</ul>
<footer>