Topics in Cryptology – CT-RSA 2008 The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings /
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2008, CT-RSA 2008, held in San Francisco, CA, USA in April 2008. The 26 revised full papers presented together with the abstract of 1 invited talk were carefully reviewed and selected from 95 submi...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2008.
|
Series: | Lecture Notes in Computer Science,
4964 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Hash Function Cryptanalysis
- Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
- Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks
- Cryptographic Building Blocks
- Efficient Fully-Simulatable Oblivious Transfer
- Separation Results on the “One-More” Computational Problems
- Fairness in Secure Computation
- An Efficient Protocol for Fair Secure Two-Party Computation
- Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles
- Legally-Enforceable Fairness in Secure Two-Party Computation
- Message Authentication Codes
- Security of NMAC and HMAC Based on Non-malleability
- Aggregate Message Authentication Codes
- Improved AES Implementations
- Boosting AES Performance on a Tiny Processor Core
- A Fast and Cache-Timing Resistant Implementation of the AES
- Public Key Encryption with Special Properties
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Public-Key Encryption with Non-interactive Opening
- Side Channel Cryptanalysis
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL
- Fault Analysis Study of IDEA
- Susceptibility of UHF RFID Tags to Electromagnetic Analysis
- Cryptography for Limited Devices
- Online/Offline Signature Schemes for Devices with Limited Computing Capabilities
- RFID Security: Tradeoffs between Security and Efficiency
- Invited Talk
- Program Obfuscation and One-Time Programs
- Key Exchange
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
- Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
- Cryptanalysis
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- Small Secret Key Attack on a Variant of RSA (Due to Takagi)
- Cryptographic Protocols
- Super-Efficient Verification of Dynamic Outsourced Databases
- A Latency-Free Election Scheme.