Update cookies preferences

E-book: Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings

Edited by
  • Format: PDF+DRM
  • Series: Lecture Notes in Computer Science 5985
  • Pub. Date: 15-Feb-2010
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783642119255
Other books in subject:
  • Format - PDF+DRM
  • Price: 55,56 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: PDF+DRM
  • Series: Lecture Notes in Computer Science 5985
  • Pub. Date: 15-Feb-2010
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783642119255
Other books in subject:

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf- ence has included an academic Cryptographers'Track (CT-RSA). This year was the 10th anniversary of CT-RSA. Since its conception, the CT-RSA conference has become a major avenue for publishing high-quality research papers. The RSA conference was held in San Francisco, California, during March 1-5, 2010. This year we received94 submissions. Eachpaper gotassignedto three ref- ees. Papers submitted by the members of the Program Committee got assigned to vereferees.Inthe rststageofthereviewprocess,thesubmittedpaperswere read and evaluated by the ProgramCommittee members and then in the second stage, the papers were scrutinized during an extensive discussion. Finally, the Program Committee chose 25 papers to be included in the conference program. The authors of the accepted papers had two weeks for revision and preparation of ?nal versions.The revised papers were not subject to editorial review and the authors bear full responsibility for their contents. The submission and review process was supported by the iChair conference submission server. We thank Matthiew Finiasz and Thomas Baign' eres for letting us use iChair. The conf- ence proceedings were published by Springer in this volume of Lecture Notes in Computer Science.
Invited Talk
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition
1(14)
Bart Preneel
Public-Key Cryptography
Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries
15(11)
Nigel P. Smart
Efficient CRT-RSA Decryption for Small Encryption Exponents
26(15)
Subhamoy Maitra
Santanu Sarkar
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
41(16)
Scott Yilek
Plaintext-Awareness of Hybrid Encryption
57(16)
Shaoquan Jiang
Huaxiong Wang
Speed Records for NTRU
73(16)
Jens Hermans
Frederik Vercauteren
Bart Preneel
High-Speed Parallel Software Implementation of the nT Pairing
89(17)
Diego F. Aranha
Julio Lopez
Darrel Hankerson
Refinement of Miller's Algorithm Over Edwards Curves
106(13)
Lei Xu
Dongdai Lin
Probabilistic Public Key Encryption with Equality Test
119(13)
Guomin Yang
Chik How Tan
Qiong Huang
Duncan S. Wong
Efficient CCA-Secure PKE from Identity-Based Techniques
132(16)
Junzuo Lai
Robert H. Deng
Shengli Liu
Weidong Kou
Anonymity from Asymmetry: New Constructions for Anonymous HIBE
148(17)
Leo Ducas
Making the Diffie-Hellman Protocol Identity-Based
165(14)
Dario Fiore
Rosario Gennaro
On Extended Sanitizable Signature Schemes
179(16)
Sebastien Canard
Amandine Jambert
Side-Channel Attacks
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
195(13)
Shivam Bhasin
Sylvain Guilley
Laurent Sauvage
Jean-Luc Danger
Fault Attacks Against EMV Signatures
208(13)
Jean-Sebastien Coron
David Naccache
Mehdi Tibouchi
Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis
221(14)
Benedikt Gierlichs
Lejla Batina
Bart Preneel
Ingrid Verbauwhede
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
235(17)
Andrey Bogdanov
Thomas Eisenbarth
Christof Paar
Malte Wienecke
Cryptographic Protocols
Usable Optimistic Fair Exchange
252(16)
Alptekin Kupcu
Anna Lysyanskaya
Hash Function Combiners in TLS and SSL
268(16)
Marc Fischlin
Anja Lehmann
Daniel Wagner
Improving Efficiency of an `On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness
284(18)
Bagus Santoso
Kazuo Ohta
Kazuo Sakiyama
Goichiro Hanaoka
Cryptanalysis
Linear Cryptanalysis of Reduced-Round Present
302(16)
Joo Yeon Cho
Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited
318(16)
Miia Hermelin
Kaisa Nyberg
Practical Key Recovery Attack against Secret-IV Edon-R
334(16)
Gaetan Leurent
Rebound Attacks on the Reduced Grøstl Hash Function
350(16)
Florian Mendel
Christian Rechberger
Martin Schlaffer
Søren S. Thomsen
Symmetric Cryptography
The Sum of CBC MACs Is a Secure PRF
366(16)
Kan Yasuda
On Fast Verification of Hash Chains
382(15)
Dae Hyun Yum
Jin Seok Kim
Pil Joong Lee
Sung Je Hong
Author Index 397