


default search action
CT-RSA 2017: San Francisco, CA, USA
- Helena Handschuh:

Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings. Lecture Notes in Computer Science 10159, Springer 2017, ISBN 978-3-319-52152-7
Public Key Implementations
- Jeffrey Hoffstein

, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang:
Choosing Parameters for NTRUEncrypt. 3-18 - Marc Joye, Benoît Libert:

Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves. 19-35
Lattice-Based Cryptanalysis
- Shang-Yi Yang, Po-Chun Kuo

, Bo-Yin Yang, Chen-Mou Cheng:
Gauss Sieve Algorithm on GPUs. 39-57 - Atsushi Takayasu, Noboru Kunihiro

:
A Tool Kit for Partial Key Exposure Attacks on RSA. 58-73
Fault and Glitch Resistant Implementations
- Jakub Breier

, Xiaolu Hou
:
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme. 77-94 - Hannes Groß, Stefan Mangard

, Thomas Korak:
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order. 95-112
Side-channel Resistant Implementations
- Praveen Kumar Vadnala:

Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers. 115-130 - Pascal Sasdrich

, Amir Moradi
, Tim Güneysu
:
Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware. 131-146
Digital Signatures and Random Numbers
- Dan Boneh, Shay Gueron

:
Surnaming Schemes, Fast Verification, and Applications to SGX Technology. 149-164 - Yuan Ma, Jingqiang Lin, Jiwu Jing:

On the Entropy of Oscillator-Based True Random Number Generators. 165-180
Post-quantum Cryptography
- Jintai Ding

, Saed Alsayigh
, Jean Lancrenon, Saraswathy RV, Michael Snook:
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World. 183-204
Symmetric Key Cryptanalysis
- Christoph Dobraunig

, Eik List:
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC. 207-222 - Bart Mennink:

Weak Keys for AEZ, and the External Key Padding Attack. 223-237
Symmetric Key Constructions
- Louiza Khati, Nicky Mouha, Damien Vergnaud

:
Full Disk Encryption: Bridging Theory and Practice. 241-257 - Eik List, Mridul Nandi

:
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption. 258-274
2017 Selected Topics
- Ren Zhang, Bart Preneel

:
Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin. 277-292 - Jihoon Cho, Kyu Young Choi

, Itai Dinur, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg:
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction. 293-308
Improved Key Recovery Algorithms
- Liron David, Avishai Wool

:
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks. 311-327 - Noboru Kunihiro

, Yuki Takahashi:
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise. 328-343
Side-channel Analysis
- Weijia Wang

, Yu Yu, François-Xavier Standaert
, Dawu Gu, Sen Xu, Chi Zhang:
Ridge-Based Profiled Differential Power Analysis. 347-362 - Si Gao

, Hua Chen, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma:
My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses. 363-378
Cryptographic Protocols
- Michele Orrù

, Emmanuela Orsini
, Peter Scholl
:
Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection. 381-396 - Fernando Krell, Gabriela F. Ciocarlie, Ashish Gehani, Mariana Raykova:

Low-Leakage Secure Search for Boolean Expressions. 397-413
Public Key Algorithms
- Dingding Jia, Xianhui Lu, Bao Li:

Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks. 417-431 - Yohei Watanabe, Keita Emura

, Jae Hong Seo
:
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. 432-449

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














