default search action
CT-RSA 2015: San Francisco, CA, USA
- Kaisa Nyberg:
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings. Lecture Notes in Computer Science 9048, Springer 2015, ISBN 978-3-319-16714-5 - Joop van de Pol, Nigel P. Smart, Yuval Yarom:
Just a Little Bit More. 3-21 - Billy Bob Brumley:
Cache Storage Attacks. 22-34 - Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. 37-58 - Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. 59-83 - Nuttapong Attrapadung, Shota Yamada:
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings. 87-105 - Jae Hong Seo, Keita Emura:
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts. 106-123 - David Derler, Christian Hanser, Daniel Slamanig:
Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives. 127-144 - Olivier Blazy, Céline Chevalier, Damien Vergnaud:
Non-Interactive Zero-Knowledge Proofs of Non-Membership. 145-164 - Conrado Porto Lopes Gouvêa, Julio López:
Implementing GCM on ARMv8. 167-180 - Junwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu:
Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON. 181-198 - Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption. 201-219 - Florian Maury, Jean-René Reinhard, Olivier Levillain, Henri Gilbert:
Format Oracles on OpenPGP. 220-236 - Wei Wei, Mingjie Liu, Xiaoyun Wang:
Finding Shortest Lattice Vectors in the Presence of Gaps. 239-257 - Koji Nuida, Naoto Itakura, Kaoru Kurosawa:
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints. 258-269 - Jonathan Katz, Stefan Lucks, Aishwarya Thiruvengadam:
Hash Functions from Defective Ideal Ciphers. 273-290 - Yusi Zhang:
Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication. 291-307 - Marcin Andrychowicz, Ivan Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou:
Efficient Leakage Resilient Circuit Compilers. 311-329 - Handan Kilinç, Alptekin Küpçü:
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation. 330-349 - Yu Sasaki, Kan Yasuda:
How to Incorporate Associated Data in Sponge-Based Authenticated Encryption. 353-370 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Cryptanalysis of Ascon. 371-387 - Essam Ghadafi:
Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions. 391-409 - Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption. 410-428 - Neil Hanley, HeeSeok Kim, Michael Tunstall:
Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace. 431-448 - Bertram Poettering, Dale L. Sibborn:
Cold Boot Attacks in the Discrete Logarithm Setting. 449-465 - Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang:
Communication Optimal Tardos-Based Asymmetric Fingerprinting. 469-486 - Guilhem Castagnos, Fabien Laguillaumie:
Linearly Homomorphic Encryption from $$\mathsf {DDH}$$. 487-505
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.