


default search action
CT-RSA 2008: San Francisco, CA, USA
- Tal Malkin:

Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings. Lecture Notes in Computer Science 4964, Springer 2008, ISBN 978-3-540-79262-8
Hash Function Cryptanalysis
- Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro

:
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. 1-18 - Pierre-Alain Fouque, Gaëtan Leurent

:
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. 19-35 - Praveen Gauravaram

, John Kelsey
:
Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. 36-51
Cryptographic Building Blocks
- Andrew Y. Lindell:

Efficient Fully-Simulatable Oblivious Transfer. 52-70 - Emmanuel Bresson, Jean Monnerat, Damien Vergnaud

:
Separation Results on the "One-More" Computational Problems. 71-87
Fairness in Secure Computation
- Mehmet S. Kiraz

, Berry Schoenmakers:
An Efficient Protocol for Fair Secure Two-Party Computation. 88-105 - Qiong Huang, Guomin Yang

, Duncan S. Wong, Willy Susilo
:
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. 106-120 - Andrew Y. Lindell:

Legally-Enforceable Fairness in Secure Two-Party Computation. 121-137
Message Authentication Codes
- Marc Fischlin:

Security of NMACand HMACBased on Non-malleability. 138-154 - Jonathan Katz, Andrew Y. Lindell:

Aggregate Message Authentication Codes. 155-169
Improved AES Implementations
- Stefan Tillich, Christoph Herbst:

Boosting AES Performance on a Tiny Processor Core. 170-186 - Robert Könighofer:

A Fast and Cache-Timing Resistant Implementation of the AES. 187-202
Public Key Encryption with Special Properties
- Jian Weng

, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. 203-220 - Eike Kiltz

, Yevgeniy Vahlis:
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. 221-238 - Ivan Damgård, Dennis Hofheinz, Eike Kiltz

, Rune Thorbek:
Public-Key Encryption with Non-interactive Opening. 239-255
Side Channel Cryptanalysis
- Onur Aciiçmez, Werner Schindler:

A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. 256-273 - Christophe Clavier, Benedikt Gierlichs, Ingrid Verbauwhede

:
Fault Analysis Study of IDEA. 274-287 - Thomas Plos:

Susceptibility of UHF RFID Tags to Electromagnetic Analysis. 288-300
Cryptography for Limited Devices
- Ping Yu, Stephen R. Tate:

Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. 301-317 - Ivan Damgård, Michael Østergaard Pedersen:

RFID Security: Tradeoffs between Security and Efficiency. 318-332
Invited Talk
- Shafi Goldwasser:

Program Obfuscation and One-Time Programs. 333-334
Key Exchange
- Michel Abdalla

, Dario Catalano, Céline Chevalier, David Pointcheval:
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. 335-351 - Stanislaw Jarecki, Jihye Kim, Gene Tsudik:

Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. 352-369
Cryptanalysis
- Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman

:
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. 370-386 - Kouichi Itoh, Noboru Kunihiro

, Kaoru Kurosawa:
Small Secret Key Attack on a Variant of RSA (Due to Takagi). 387-406
Cryptographic Protocols
- Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos:

Super-Efficient Verification of Dynamic Outsourced Databases. 407-424 - Kristian Gjøsteen:

A Latency-Free Election Scheme. 425-436

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














