default search action
CT-RSA 2004: San Francisco, CA, USA
- Tatsuaki Okamoto:
Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings. Lecture Notes in Computer Science 2964, Springer 2004, ISBN 3-540-20996-4
Symmetric Encryption
- Alexandra Boldyreva, Nut Taesombut:
Online Encryption Schemes: New Security Notions and Constructions. 1-14 - Raphael Chung-Wei Phan:
Related-Key Attacks on Triple-DES and DESX Variants. 15-24 - Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih:
Design of AES Based on Dual Cipher and Composite Field. 25-38 - Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen:
Periodic Properties of Counter Assisted Stream Ciphers. 39-53 - Maneli Noorkami, Faramarz Fekri:
A Fast Correlation Attack via Unequal Error Correcting LDPC Codes. 54-66
Asymmetric Encryption
- Swee-Huay Heng, Kaoru Kurosawa:
k-Resilient Identity-Based Encryption in the Standard Model. 67-80 - Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung:
A Generic Construction for Intrusion-Resilient Public-Key Encryption. 81-98
Digital Signatures
- Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn:
A Certificate-Based Signature Scheme. 99-111 - Benoît Libert, Jean-Jacques Quisquater:
Identity Based Undeniable Signatures. 112-125 - Daniel Bleichenbacher:
Compressing Rabin Signatures. 126-128
Protocols
- Adam L. Young, Moti Yung:
A Key Recovery System as Secure as Factoring. 129-142 - Kemal Bicakci, Nazife Baykal:
Server Assisted Signatures Revisited. 143-156 - Jean-Sébastien Coron, David Naccache:
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. 157-162 - Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson:
Universal Re-encryption for Mixnets. 163-178 - Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai:
Bit String Commitment Reductions with a Non-zero Rate. 179-193 - Qinglin Jiang, Douglas S. Reeves, Peng Ning:
Improving Robustness of PGP Keyrings by Conflict Detection. 194-207
Side-Channel Attacks
- Colin D. Walter:
Issues of Security with the Oswald-Aigner Exponentiation Algorithm. 208-221 - Stefan Mangard:
Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness. 222-235 - Benoît Chevallier-Mames:
Self-Randomized Exponentiation Algorithms. 236-249
Hardware
- Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs:
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. 250-263 - Wieland Fischer, Jean-Pierre Seifert:
High-Speed Modular Multiplication. 264-277 - Willi Geiselmann, Rainer Steinwandt:
Yet Another Sieving Device. 278-291
Mode of Operations
- Shai Halevi, Phillip Rogaway:
A Parallelizable Enciphering Mode. 292-304 - Kenneth G. Paterson, Arnold K. L. Yau:
Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. 305-323
Hash and Hash Chains
- Roar Lien, Tim Grembowski, Kris Gaj:
A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. 324-338 - Marc Fischlin:
Fast Verification of Hash Chains. 339-352
Visual Cryptography
- Quang Viet Duong, Kaoru Kurosawa:
Almost Ideal Contrast Visual Cryptography with Reversing. 353-365
Elliptic Curve Cryptosystems
- Alfred Menezes, Edlyn Teske, Annegret Weng:
Weak Fields for ECC. 366-386
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.