


default search action
CT-RSA 2007: San Francisco, CA, USA
- Masayuki Abe:

Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings. Lecture Notes in Computer Science 4377, Springer 2006, ISBN 3-540-69327-0
Symmetric-Key Encryption
- Nathan Keller, Stephen D. Miller

, Ilya Mironov, Ramarathnam Venkatesan:
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. 1-19 - Eli Biham, Orr Dunkelman, Nathan Keller:

A Simple Related-Key Attack on the Full SHACAL-1. 20-30
Signatures and Authentication
- Pascal Paillier:

Impossibility Proofs for RSA Signatures in the Standard Model. 31-48 - Eric R. Verheul:

Selecting Secure Passwords. 49-66 - Hassan Jameel, Riaz Ahmed Shaikh

, Heejo Lee, Sungyoung Lee:
Human Identification Through Image Evaluation Using Secret Predicates. 67-84
Hash Functions
- Florian Mendel

, Joseph Lano, Bart Preneel:
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. 85-100 - Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:

Second Preimages for SMASH. 101-111
Digital Signatures (I)
- Haifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang:

A Practical Optimal Padding for Signature Schemes. 112-128 - Xun Yi:

Directed Transitive Signature Scheme. 129-144 - Mihir Bellare, Gregory Neven:

Identity-Based Multi-signatures from RSA. 145-162
Cryptographic Protocols (I)
- Matthew K. Franklin, Mark A. Gondree

, Payman Mohassel:
Improved Efficiency for Private Stable Matching. 163-177 - Man Ho Au, Qianhong Wu, Willy Susilo

, Yi Mu:
Compact E-Cash from Bounded Accumulator. 178-195 - Koji Chida, Go Yamamoto:

Batch Processing of Interactive Proofs. 196-207
Side-Channel Attacks (I)
- Joseph H. Silverman, William Whyte:

Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. 208-224 - Onur Aciiçmez, Çetin Kaya Koç

, Jean-Pierre Seifert:
Predicting Secret Keys Via Branch Prediction. 225-242
Side-Channel Attacks (II)
- Elisabeth Oswald

, Stefan Mangard
:
Template Attacks on Masking - Resistance Is Futile. 243-256 - Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten:

Differential Power Analysis of Stream Ciphers. 257-270 - Onur Aciiçmez, Werner Schindler

, Çetin Kaya Koç
:
Cache Based Remote Timing Attack on the AES. 271-286
Cryptographic Protocols (II)
- Stanislaw Jarecki, Jihye Kim

, Gene Tsudik:
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. 287-308 - Sangjoon Park, Junghyun Nam, Seungjoo Kim

, Dongho Won:
Efficient Password-Authenticated Key Exchange Based on RSA. 309-323 - Yvo Desmedt, Goce Jakimoski:

Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. 324-338
Digital Signatures (II)
- Benoît Chevallier-Mames, Marc Joye:

A Practical and Tightly Secure Signature Scheme Without Hash Function. 339-356 - Ron Steinfeld, Josef Pieprzyk

, Huaxiong Wang:
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. 357-371
E?cient Implementation
- Máire McLoone, Matthew J. B. Robshaw:

Public Key Cryptography and RFID Tags. 372-384 - Karl Scheibelhofer:

A Bit-Slice Implementation of the Whirlpool Hash Function. 385-401

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














