


default search action
CT-RSA 2011: San Francisco, CA, USA
- Aggelos Kiayias:

Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. Lecture Notes in Computer Science 6558, Springer 2011, ISBN 978-3-642-19073-5
Secure Two-Party Computation
- Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider

, Ivan Visconti:
Secure Set Intersection with Untrusted Hardware Tokens. 1-16 - Ching-Hua Yu, Sherman S. M. Chow

, Kai-Min Chung
, Feng-Hao Liu:
Efficient Secure Two-Party Exponentiation. 17-32
Cryptographic Primitives
- Kun Peng:

A General, Flexible and Efficient Proof of Inclusion and Exclusion. 33-48 - Sherman S. M. Chow

, Kristiyan Haralambiev:
Non-interactive Confirmer Signatures. 49-64 - Kashi Neupane, Rainer Steinwandt:

Communication-Efficient 2-Round Group Key Establishment from Pairings. 65-76
Side Channel Attacks
- Marc F. Witteman, Jasper G. J. van Woudenberg, Federico Menarini:

Defeating RSA Multiply-Always and Message Blinding Countermeasures. 77-88 - Chester Rebeiro

, Debdeep Mukhopadhyay:
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns. 89-103 - Jasper G. J. van Woudenberg, Marc F. Witteman, Bram Bakker

:
Improving Differential Power Analysis by Elastic Alignment. 104-119
Invited Talk
- Richard M. George:

NSA's Role in the Development of DES. 120
Authenticated Key Agreement
- Atsushi Fujioka, Koutarou Suzuki:

Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys. 121-141 - Michel Abdalla

, Céline Chevalier, Louis Granboulan, David Pointcheval
:
Contributory Password-Authenticated Group Key Exchange with Join Capability. 142-160
Proofs of Security
- Ralf Küsters, Max Tuengerthal:

Ideal Key Derivation and Encryption in Simulation-Based Security. 161-179 - Gilles Barthe, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella-Béguelin

:
Beyond Provable Security Verifiable IND-CCA Security of OAEP. 180-196 - Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama:

(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. 197-212 - Jooyoung Lee, Martijn Stam:

MJH: A Faster Alternative to MDC-2. 213-236
Block Ciphers
- Phillip Rogaway, Haibin Zhang:

Online Ciphers from Tweakable Blockciphers. 237-249 - Gautham Sekar, Nicky Mouha, Vesselin Velichkov, Bart Preneel

:
Meet-in-the-Middle Attacks on Reduced-Round XTEA. 250-267
Security Notions
- Paul Baecher, Marc Fischlin, Dominique Schröder

:
Expedient Non-malleability Notions for Hash Functions. 268-283 - Douglas Stebila

, Lakshmi Kuppusamy
, Jothi Rangasamy
, Colin Boyd, Juan Manuel González Nieto:
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. 284-301
Public-Key Encryption
- Joonsang Baek

, Cheng-Kang Chu, Jianying Zhou
:
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes. 302-318 - Richard Lindner, Chris Peikert:

Better Key Sizes (and Attacks) for LWE-Based Encryption. 319-339
Crypto Tools and Parameters
- Julien Devigne, Marc Joye:

Binary Huff Curves. 340-355 - Antoine Joux

, Vanessa Vitse:
A Variant of the F4 Algorithm. 356-375 - Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek:

Attribute-Based Signatures. 376-392
Digital Signatures
- Eiichiro Fujisaki:

Sub-linear Size Traceable Ring Signatures without Random Oracles. 393-415

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














