Title:
Topics in Cryptology -- CT-RSA 2015 The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings
Author:
Nyberg, Kaisa. editor.
ISBN:
9783319167152
Edition:
1st ed. 2015.
Physical Description:
XIII, 508 p. 79 illus. online resource.
Series:
Security and Cryptology, 9048
Contents:
Timing Attacks -- Just A Little Bit More -- Cache Storage Attacks -- Design and Analysis of Block Ciphers -- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows -- Improved Attacks on Reduced-Round Camellia-128/192/256 -- Attribute and Identity Based Encryption Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings -- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts -- Membership -- Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives -- Non-Interactive Zero-Knowledge Proofs of Non-Membership -- Secure and Efficient Implementation of AES Based Cryptosystems Implementing GCM on ARMv8 -- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON -- Chosen Ciphertext Attacks in Theory and Practice Completeness of Single-Bit Projection-KDM Security for Public Key Encryption -- Format Oracles on OpenPGP -- Algorithms for Solving Hard Problems -- Finding Shortest Lattice Vectors in the Presence of Gaps -- A Simple and Improved Algorithm for Integer Factorization with Implicit Hints -- Constructions of Hash Functions and Message Authentication Codes -- Hash Functions from Defective Ideal Ciphers -- Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication -- Secure Multiparty Computation.-Efficient Leakage Resilient Circuit Compilers -- Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party -- Computation -- Authenticated Encryption -- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption -- Cryptanalysis of Ascon -- Detecting and Tracing Malicious Activities Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions -- Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption -- Implementation Attacks on Exponentiation Algorithms -- Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace -- Cold Boot Attacks in the Discrete Logarithm Setting -- Homomorphic Encryption and Its Applications -- Communication Optimal Tardos-based Asymmetric Fingerprinting. Linearly Homomorphic Encryption from DDH.
Added Author:
Added Corporate Author:
Electronic Access:
https://doi.org/10.1007/978-3-319-16715-2Copies:
Available:*
Library | Material Type | Item Barcode | Shelf Number | Status | Item Holds |
---|---|---|---|---|---|
Searching... | E-Book | 519219-1001 | XX(519219.1) | Searching... | Searching... |