


default search action
CT-RSA 2004: San Francisco, CA, USA
- Tatsuaki Okamoto:

Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings. Lecture Notes in Computer Science 2964, Springer 2004, ISBN 3-540-20996-4
Symmetric Encryption
- Alexandra Boldyreva, Nut Taesombut:

Online Encryption Schemes: New Security Notions and Constructions. 1-14 - Raphael Chung-Wei Phan:

Related-Key Attacks on Triple-DES and DESX Variants. 15-24 - Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih:

Design of AES Based on Dual Cipher and Composite Field. 25-38 - Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen:

Periodic Properties of Counter Assisted Stream Ciphers. 39-53 - Maneli Noorkami, Faramarz Fekri:

A Fast Correlation Attack via Unequal Error Correcting LDPC Codes. 54-66
Asymmetric Encryption
- Swee-Huay Heng, Kaoru Kurosawa:

k-Resilient Identity-Based Encryption in the Standard Model. 67-80 - Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji

, Moti Yung:
A Generic Construction for Intrusion-Resilient Public-Key Encryption. 81-98
Digital Signatures
- Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn:

A Certificate-Based Signature Scheme. 99-111 - Benoît Libert, Jean-Jacques Quisquater:

Identity Based Undeniable Signatures. 112-125 - Daniel Bleichenbacher:

Compressing Rabin Signatures. 126-128
Protocols
- Adam L. Young, Moti Yung:

A Key Recovery System as Secure as Factoring. 129-142 - Kemal Bicakci

, Nazife Baykal:
Server Assisted Signatures Revisited. 143-156 - Jean-Sébastien Coron, David Naccache:

Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. 157-162 - Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson:

Universal Re-encryption for Mixnets. 163-178 - Anderson C. A. Nascimento

, Jörn Müller-Quade, Hideki Imai:
Bit String Commitment Reductions with a Non-zero Rate. 179-193 - Qinglin Jiang, Douglas S. Reeves, Peng Ning:

Improving Robustness of PGP Keyrings by Conflict Detection. 194-207
Side-Channel Attacks
- Colin D. Walter:

Issues of Security with the Oswald-Aigner Exponentiation Algorithm. 208-221 - Stefan Mangard:

Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness. 222-235 - Benoît Chevallier-Mames:

Self-Randomized Exponentiation Algorithms. 236-249
Hardware
- Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs

:
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. 250-263 - Wieland Fischer, Jean-Pierre Seifert:

High-Speed Modular Multiplication. 264-277 - Willi Geiselmann, Rainer Steinwandt:

Yet Another Sieving Device. 278-291
Mode of Operations
- Shai Halevi, Phillip Rogaway:

A Parallelizable Enciphering Mode. 292-304 - Kenneth G. Paterson, Arnold K. L. Yau:

Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. 305-323
Hash and Hash Chains
- Roar Lien, Tim Grembowski, Kris Gaj:

A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. 324-338 - Marc Fischlin:

Fast Verification of Hash Chains. 339-352
Visual Cryptography
- Quang Viet Duong, Kaoru Kurosawa:

Almost Ideal Contrast Visual Cryptography with Reversing. 353-365
Elliptic Curve Cryptosystems
- Alfred Menezes, Edlyn Teske, Annegret Weng:

Weak Fields for ECC. 366-386

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














