


default search action
CT-RSA 2014: San Francisco, CA, USA
- Josh Benaloh:

Topics in Cryptology - CT-RSA 2014 - The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings. Lecture Notes in Computer Science 8366, Springer 2014, ISBN 978-3-319-04851-2
Non-integral Asymmetric Functions
- Armando Faz-Hernández

, Patrick Longa, Ana Helena Sánchez:
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves. 1-27 - Shi Bai, Steven D. Galbraith

:
An Improved Compression Technique for Signatures Based on Learning with Errors. 28-47
Public-Key Encryption
- Dennis Hofheinz, Christoph Striecks:

A Generic View on Trace-and-Revoke Broadcast Encryption Schemes. 48-63 - Nelly Fazio, Antonio Nicolosi, Irippuge Milinda Perera:

Broadcast Steganography. 64-84 - Sherman S. M. Chow

, Matthew K. Franklin, Haibin Zhang:
Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications. 85-105
Hardware Implementations
- Jeroen Delvaux

, Ingrid Verbauwhede
:
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation. 106-131 - Frederik Armknecht

, Vasily Mikhalev:
On Increasing the Throughput of Stream Ciphers. 132-151 - Duc-Phong Le

, Matthieu Rivain, Chik How Tan:
On Double Exponentiation for Securing RSA against Fault Analysis. 152-168
Side-Channel Attacks
- Emmanuel Prouff, Matthieu Rivain, Thomas Roche:

On the Practical Security of a Leakage Resilient Masking Scheme. 169-182 - Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert

:
The Myth of Generic DPA...and the Magic of Learning. 183-205 - Lubos Gaspar, Gaëtan Leurent

, François-Xavier Standaert
:
Hardware Implementation and Side-Channel Analysis of Lapin. 206-226
Symmetric Encryption and Cryptanalysis
- Alex Biryukov

, Vesselin Velichkov:
Automatic Search for Differential Trails in ARX Ciphers. 227-250 - Markku-Juhani O. Saarinen

:
CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions. 251-269 - Markku-Juhani O. Saarinen

:
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation. 270-285
Digital Signatures
- Benoît Libert, Marc Joye:

Group Signatures with Message-Dependent Opening in the Standard Model. 286-306 - Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow

, Bo Qin, Jianwei Liu
:
Practical Distributed Signatures in the Standard Model. 307-326 - Ali El Kaafarani, Essam Ghadafi

, Dalia Khader:
Decentralized Traceable Attribute-Based Signatures. 327-348
Protocols
- Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, Brent Waters:

Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions. 349-366 - Qiong Huang, Duncan S. Wong, Willy Susilo

:
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures. 367-384 - Kaoru Kurosawa, Jun Furukawa:

2-Pass Key Exchange Protocols from CPA-Secure KEM. 385-401
Hash Function Cryptanalysis
- Jian Guo

, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu:
Analysis of BLAKE2. 402-423 - Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta:

An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl. 424-443 - Gaoli Wang:

Practical Collision Attack on 40-Step RIPEMD-128. 444-460
Applications of Cryptographic Primitives
- Gareth T. Davies

, Martijn Stam:
KDM Security in the Hybrid Framework. 461-480 - Dmitry Khovratovich:

Key Wrapping with a Fixed Permutation. 481-499

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














