Theresa Calderon, S. Meiklejohn, H. Shacham, Brent Waters
{"title":"Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions","authors":"Theresa Calderon, S. Meiklejohn, H. Shacham, Brent Waters","doi":"10.1007/978-3-319-04852-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_18","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key Wrapping with a Fixed Permutation","authors":"D. Khovratovich","doi":"10.1007/978-3-319-04852-9_25","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_25","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130647368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL","authors":"C. Arnaud, Pierre-Alain Fouque","doi":"10.1007/978-3-642-36095-4_2","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_2","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114184798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Florian Mendel, V. Rijmen, Deniz Toz, Kerem Varici
{"title":"Collisions for the WIDEA-8 Compression Function","authors":"Florian Mendel, V. Rijmen, Deniz Toz, Kerem Varici","doi":"10.1007/978-3-642-36095-4_11","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_11","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129704919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Collisions for Round-Reduced SM3","authors":"Florian Mendel, T. Nad, Martin Schläffer","doi":"10.1007/978-3-642-36095-4_12","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_12","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accountable Authority Identity-Based Encryption with Public Traceability","authors":"Junzuo Lai, R. Deng, Yunlei Zhao, J. Weng","doi":"10.1007/978-3-642-36095-4_21","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_21","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124860254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag","authors":"Thomas Korak, Thomas Plos","doi":"10.1007/978-3-642-36095-4_14","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_14","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115078928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012","authors":"Toshiyuki Isshiki, M. H. Nguyen, Keisuke Tanaka","doi":"10.1007/978-3-642-36095-4_18","DOIUrl":"https://doi.org/10.1007/978-3-642-36095-4_18","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}