{"title":"Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings","authors":"Nuttapong Attrapadung, Shota Yamada","doi":"10.1007/978-3-319-16715-2_5","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_5","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
{"title":"Cryptanalysis of Ascon","authors":"Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer","doi":"10.1007/978-3-319-16715-2_20","DOIUrl":"https://doi.org/10.1007/978-3-319-16715-2_20","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126905777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Search for Differential Trails in ARX Ciphers","authors":"A. Biryukov, V. Velichkov","doi":"10.1007/978-3-319-04852-9_12","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_12","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114421848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lubos Gaspar, G. Leurent, François-Xavier Standaert
{"title":"Hardware Implementation and Side-Channel Analysis of Lapin","authors":"Lubos Gaspar, G. Leurent, François-Xavier Standaert","doi":"10.1007/978-3-319-04852-9_11","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_11","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122247552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"KDM Security in the Hybrid Framework","authors":"Gareth T. Davies, Martijn Stam","doi":"10.1007/978-3-319-04852-9_24","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_24","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132182964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Group Signatures with Message-Dependent Opening in the Standard Model","authors":"Benoît Libert, M. Joye","doi":"10.1007/978-3-319-04852-9_15","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_15","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132633779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Double Exponentiation for Securing RSA against Fault Analysis","authors":"Duc-Phong Le, Matthieu Rivain, C. H. Tan","doi":"10.1007/978-3-319-04852-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-04852-9_8","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127498923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}