


default search action
CT-RSA 2016: San Francisco, CA, USA
- Kazue Sako:

Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings. Lecture Notes in Computer Science 9610, Springer 2016, ISBN 978-3-319-29484-1
Secure Key Exchange Schemes
- Olivier Blazy

, Céline Chevalier, Damien Vergnaud
:
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions. 3-18 - Rongmao Chen, Yi Mu, Guomin Yang

, Willy Susilo
, Fuchun Guo
:
Strongly Leakage-Resilient Authenticated Key Exchange. 19-36
Authenticated Encryption
- Avik Chakraborti, Nilanjan Datta, Mridul Nandi

:
INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes. 39-54 - Colin Boyd, Britta Hale

, Stig Frode Mjølsnes
, Douglas Stebila
:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. 55-71
Searchable Symmetric Encryption
- Sebastian Gajek:

Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption. 75-89 - Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky:

Private Large-Scale Databases with Distributed Searchable Symmetric Encryption. 90-107
Digital Signatures with New Functionality
- David Pointcheval

, Olivier Sanders:
Short Randomizable Signatures. 111-126 - Olivier Blazy

, David Derler
, Daniel Slamanig
, Raphael Spreitzer
:
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability. 127-143
Secure Multi Party Computation
- James Alderman, Christian Janson, Carlos Cid, Jason Crampton:

Hybrid Publicly Verifiable Computation. 147-163 - Chongwon Cho

, Dana Dachman-Soled, Stanislaw Jarecki:
Efficient Concurrent Covert Computation of String Equality and Set Intersection. 164-179
How to Verify Procedures
- Gunnar Hartung:

Secure Audit Logs with Verifiable Excerpts. 183-199 - Prastudy Fauzi

, Helger Lipmaa:
Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles. 200-216
Side-Channel Attacks on Elliptic Curve Cryptography
- Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer

:
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. 219-235 - Pierre Belgarric, Pierre-Alain Fouque

, Gilles Macario-Rat, Mehdi Tibouchi
:
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. 236-252
Hardware Attacks and Security
- Peter Pessl, Stefan Mangard

:
Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability. 255-270 - Frederik Armknecht

, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung:
Towards a Unified Security Model for Physically Unclonable Functions. 271-287
Structure-Preserving Signatures
- Yanbin Pan:

Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014. 291-304 - Essam Ghadafi

:
Short Structure-Preserving Signatures. 305-321
Lattice Cryptography
- Ana Costache, Nigel P. Smart:

Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? 325-340 - Carlos Aguilar Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint

:
NFLlib: NTT-Based Fast Lattice Library. 341-356
Cryptanalysis of Symmetric Key Encryption
- Zhen Li:

Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling. 359-377 - Yanfeng Wang, Wenling Wu:

New Observations on Piccolo Block Cipher. 378-393
Message Authentication Code and PRF-Security
- Yusuke Naito, Lei Wang:

Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. 397-412 - Hamza Abusalah

, Georg Fuchsbauer, Krzysztof Pietrzak:
Constrained PRFs for Unbounded Inputs. 413-428
Security of Public Key Encryption
- Johannes Blömer, Gennadij Liske:

Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. 431-447 - Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:

Factoring N=p^rq^s for Large r and s. 448-464

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














