


default search action
CT-RSA 2012: San Francisco, CA, USA
- Orr Dunkelman:

Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings. Lecture Notes in Computer Science 7178, Springer 2012, ISBN 978-3-642-27953-9
Side Channel Attacks I
- Amir Moradi

, Markus Kasper, Christof Paar:
Black-Box Side-Channel Attacks Highlight the Importance of Countermeasures - An Analysis of the Xilinx Virtex-4 and Virtex-5 Bitstream Encryption Mechanism. 1-18 - Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede

:
Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs. 19-34
Digital Signatures I
- Philippe Camacho, Alejandro Hevia

:
Short Transitive Signatures for Directed Trees. 35-50 - Javier Herranz

, Fabien Laguillaumie, Benoît Libert, Carla Ràfols
:
Short Attribute-Based Signatures for Threshold Predicates. 51-67
Public-Key Encryption I
- Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi:

Reducing the Key Size of Rainbow Using Non-commutative Rings. 68-83 - Colin D. Walter:

A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation. 84-97 - Diego F. Aranha

, Jean-Luc Beuchat
, Jérémie Detrey, Nicolas Estibals:
Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves. 98-115
Cryptographic Protocols I
- Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler:

On the Joint Security of Encryption and Signature in EMV. 116-135 - Eiichiro Fujisaki:

New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications. 136-155
Secure Implementation Methods
- Houssem Maghrebi, Emmanuel Prouff, Sylvain Guilley, Jean-Luc Danger:

A First-Order Leak-Free Masking Countermeasure. 156-170 - Billy Bob Brumley

, Manuel Barbosa
, Dan Page, Frederik Vercauteren
:
Practical Realisation and Elimination of an ECC-Related Software Bug Attack. 171-186
Symmetric Key Primitives
- Alexandra Boldyreva, Virendra Kumar

:
A New Pseudorandom Generator from Collision-Resistant Hash Functions. 187-202 - Kan Yasuda:

PMAC with Parity: Minimizing the Query-Length Influence. 203-214 - Gaëtan Leurent

, Arnab Roy
:
Boomerang Attacks on Hash Function Using Auxiliary Differentials. 215-230
Side Channel Attacks II
- Johann Heyszl, Stefan Mangard

, Benedikt Heinz, Frederic Stumpf, Georg Sigl:
Localized Electromagnetic Analysis of Cryptographic Implementations. 231-244 - Youssef Souissi, Shivam Bhasin, Sylvain Guilley, Maxime Nassar, Jean-Luc Danger:

Towards Different Flavors of Combined Side Channel Attacks. 245-259
Digital Signatures II
- Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro

:
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More. 260-277 - Ivan Damgård, Jonas Kölker, Tomas Toft:

Secure Computation, I/O-Efficient Algorithms and Distributed Signatures. 278-295
Cryptographic Protocols II
- Manuel Barbosa

, Pooya Farshim:
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation. 296-312 - Carmit Hazay

, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft:
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. 313-331
Public-Key Encryption II
- Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Fabien Laguillaumie:

Plaintext-Checkable Encryption. 332-348 - Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro

, Takahiro Matsuda, Jian Weng
, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. 349-364
Side Channel Attacks III
- Annelie Heuser, Michael Kasper, Werner Schindler, Marc Stöttinger

:
A New Difference Method for Side-Channel Analysis with High-Dimensional Leakage Models. 365-382 - Lejla Batina, Jip Hogenboom, Jasper G. J. van Woudenberg:

Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis. 383-397 - Payman Mohassel, Salman Niksefat, Seyed Saeed Sadeghian, Babak Sadeghiyan:

An Efficient Protocol for Oblivious DFA Evaluation and Applications. 398-415 - Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein:

Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces. 416-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














