Topics in Cryptology -- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings
by
 
Nyberg, Kaisa. editor.

Title
Topics in Cryptology -- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings

Author
Nyberg, Kaisa. editor.

ISBN
9783319167152

Edition
1st ed. 2015.

Physical Description
XIII, 508 p. 79 illus. online resource.

Series
Security and Cryptology, 9048

Contents
Timing Attacks -- Just A Little Bit More -- Cache Storage Attacks -- Design and Analysis of Block Ciphers -- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows -- Improved Attacks on Reduced-Round Camellia-128/192/256 -- Attribute and Identity Based Encryption Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings -- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts -- Membership -- Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives -- Non-Interactive Zero-Knowledge Proofs of Non-Membership -- Secure and Efficient Implementation of AES Based Cryptosystems Implementing GCM on ARMv8 -- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON -- Chosen Ciphertext Attacks in Theory and Practice Completeness of Single-Bit Projection-KDM Security for Public Key Encryption -- Format Oracles on OpenPGP -- Algorithms for Solving Hard Problems -- Finding Shortest Lattice Vectors in the Presence of Gaps -- A Simple and Improved Algorithm for Integer Factorization with Implicit Hints -- Constructions of Hash Functions and Message Authentication Codes -- Hash Functions from Defective Ideal Ciphers -- Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication -- Secure Multiparty Computation.-Efficient Leakage Resilient Circuit Compilers -- Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party -- Computation -- Authenticated Encryption -- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption -- Cryptanalysis of Ascon -- Detecting and Tracing Malicious Activities Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions -- Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption -- Implementation Attacks on Exponentiation Algorithms -- Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace -- Cold Boot Attacks in the Discrete Logarithm Setting -- Homomorphic Encryption and Its Applications -- Communication Optimal Tardos-based Asymmetric Fingerprinting. Linearly Homomorphic Encryption from DDH.

Added Author
Nyberg, Kaisa.

Added Corporate Author
SpringerLink (Online service)

Electronic Access
https://doi.org/10.1007/978-3-319-16715-2


LibraryMaterial TypeItem BarcodeShelf Number[[missing key: search.ChildField.HOLDING]]Status
Online LibraryE-Book519219-1001ONLINEElektronik Kütüphane