


default search action
CT-RSA 2015: San Francisco, CA, USA
- Kaisa Nyberg

:
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings. Lecture Notes in Computer Science 9048, Springer 2015, ISBN 978-3-319-16714-5 - Joop van de Pol, Nigel P. Smart, Yuval Yarom

:
Just a Little Bit More. 3-21 - Billy Bob Brumley

:
Cache Storage Attacks. 22-34 - Christof Beierle

, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander
, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. 37-58 - Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:

Improved Attacks on Reduced-Round Camellia-128/192/256. 59-83 - Nuttapong Attrapadung, Shota Yamada:

Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings. 87-105 - Jae Hong Seo

, Keita Emura
:
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts. 106-123 - David Derler

, Christian Hanser, Daniel Slamanig
:
Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives. 127-144 - Olivier Blazy

, Céline Chevalier, Damien Vergnaud
:
Non-Interactive Zero-Knowledge Proofs of Non-Membership. 145-164 - Conrado Porto Lopes Gouvêa, Julio López:

Implementing GCM on ARMv8. 167-180 - Junwei Wang

, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu:
Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON. 181-198 - Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:

Completeness of Single-Bit Projection-KDM Security for Public Key Encryption. 201-219 - Florian Maury, Jean-René Reinhard, Olivier Levillain

, Henri Gilbert:
Format Oracles on OpenPGP. 220-236 - Wei Wei, Mingjie Liu, Xiaoyun Wang:

Finding Shortest Lattice Vectors in the Presence of Gaps. 239-257 - Koji Nuida

, Naoto Itakura, Kaoru Kurosawa:
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints. 258-269 - Jonathan Katz, Stefan Lucks, Aishwarya Thiruvengadam:

Hash Functions from Defective Ideal Ciphers. 273-290 - Yusi Zhang:

Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication. 291-307 - Marcin Andrychowicz, Ivan Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou:

Efficient Leakage Resilient Circuit Compilers. 311-329 - Handan Kilinç, Alptekin Küpçü

:
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation. 330-349 - Yu Sasaki, Kan Yasuda:

How to Incorporate Associated Data in Sponge-Based Authenticated Encryption. 353-370 - Christoph Dobraunig

, Maria Eichlseder
, Florian Mendel
, Martin Schläffer:
Cryptanalysis of Ascon. 371-387 - Essam Ghadafi

:
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions. 391-409 - Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura

:
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption. 410-428 - Neil Hanley, HeeSeok Kim

, Michael Tunstall
:
Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace. 431-448 - Bertram Poettering, Dale L. Sibborn:

Cold Boot Attacks in the Discrete Logarithm Setting. 449-465 - Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa

, Kateryna Pavlyk, Qiang Tang
:
Communication Optimal Tardos-Based Asymmetric Fingerprinting. 469-486 - Guilhem Castagnos, Fabien Laguillaumie:

Linearly Homomorphic Encryption from $$\mathsf {DDH}$$. 487-505

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














