


Остановите войну!
for scientists:


default search action
CT-RSA 2016: San Francisco, CA, USA
- Kazue Sako:
Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings. Lecture Notes in Computer Science 9610, Springer 2016, ISBN 978-3-319-29484-1
Secure Key Exchange Schemes
- Olivier Blazy
, Céline Chevalier, Damien Vergnaud
:
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions. 3-18 - Rongmao Chen, Yi Mu, Guomin Yang
, Willy Susilo
, Fuchun Guo:
Strongly Leakage-Resilient Authenticated Key Exchange. 19-36
Authenticated Encryption
- Avik Chakraborti, Nilanjan Datta, Mridul Nandi
:
INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes. 39-54 - Colin Boyd, Britta Hale
, Stig Frode Mjølsnes
, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. 55-71
Searchable Symmetric Encryption
- Sebastian Gajek:
Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption. 75-89 - Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky:
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption. 90-107
Digital Signatures with New Functionality
- David Pointcheval
, Olivier Sanders:
Short Randomizable Signatures. 111-126 - Olivier Blazy
, David Derler
, Daniel Slamanig
, Raphael Spreitzer
:
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability. 127-143
Secure Multi Party Computation
- James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Hybrid Publicly Verifiable Computation. 147-163 - Chongwon Cho, Dana Dachman-Soled, Stanislaw Jarecki:
Efficient Concurrent Covert Computation of String Equality and Set Intersection. 164-179
How to Verify Procedures
- Gunnar Hartung:
Secure Audit Logs with Verifiable Excerpts. 183-199 - Prastudy Fauzi
, Helger Lipmaa:
Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles. 200-216
Side-Channel Attacks on Elliptic Curve Cryptography
- Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. 219-235 - Pierre Belgarric, Pierre-Alain Fouque
, Gilles Macario-Rat, Mehdi Tibouchi
:
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. 236-252
Hardware Attacks and Security
- Peter Pessl, Stefan Mangard:
Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability. 255-270 - Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung:
Towards a Unified Security Model for Physically Unclonable Functions. 271-287
Structure-Preserving Signatures
- Yanbin Pan:
Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014. 291-304 - Essam Ghadafi
:
Short Structure-Preserving Signatures. 305-321
Lattice Cryptography
- Ana Costache, Nigel P. Smart:
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? 325-340 - Carlos Aguilar Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint
:
NFLlib: NTT-Based Fast Lattice Library. 341-356
Cryptanalysis of Symmetric Key Encryption
- Zhen Li:
Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling. 359-377 - Yanfeng Wang, Wenling Wu:
New Observations on Piccolo Block Cipher. 378-393
Message Authentication Code and PRF-Security
- Yusuke Naito, Lei Wang:
Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. 397-412 - Hamza Abusalah
, Georg Fuchsbauer, Krzysztof Pietrzak:
Constrained PRFs for Unbounded Inputs. 413-428
Security of Public Key Encryption
- Johannes Blömer, Gennadij Liske:
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. 431-447 - Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:
Factoring N=p^rq^s for Large r and s. 448-464

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.