Advertisement

© 2014

Topics in Cryptology – CT-RSA 2014

The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings

  • Josh Benaloh
Conference proceedings CT-RSA 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8366)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Non-integral Asymmetric Functions

  3. Public-Key Encryption

    1. Dennis Hofheinz, Christoph Striecks
      Pages 48-63
    2. Nelly Fazio, Antonio R. Nicolosi, Irippuge Milinda Perera
      Pages 64-84
    3. Sherman S. M. Chow, Matthew Franklin, Haibin Zhang
      Pages 85-105
  4. Hardware Implementations

    1. Frederik Armknecht, Vasily Mikhalev
      Pages 132-151
    2. Duc-Phong Le, Matthieu Rivain, Chik How Tan
      Pages 152-168
  5. Side-Channel Attacks

    1. Emmanuel Prouff, Matthieu Rivain, Thomas Roche
      Pages 169-182
    2. Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert
      Pages 183-205
    3. Lubos Gaspar, Gaëtan Leurent, François-Xavier Standaert
      Pages 206-226
  6. Symmetric Encryption and Cryptanalysis

  7. Digital Signatures

    1. Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu
      Pages 307-326
    2. Ali El Kaafarani, Essam Ghadafi, Dalia Khader
      Pages 327-348
  8. Protocols

    1. Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, Brent Waters
      Pages 349-366
    2. Qiong Huang, Duncan S. Wong, Willy Susilo
      Pages 367-384

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014. The 25 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cryptanalysis, digital signatures, protocols, hash function cryptanalysis, and applications of cryptographic primitives.

Keywords

block and stream ciphers cryptanalysis and other attacks cryptographic primitives cryptography digital signatures hash functions information security key management public key encryption security protocols

Editors and affiliations

  • Josh Benaloh
    • 1
  1. 1.Microsoft ResearchRedmondUSA

Bibliographic information

  • Book Title Topics in Cryptology – CT-RSA 2014
  • Book Subtitle The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings
  • Editors Josh Benaloh
  • Series Title Lecture Notes in Computer Science
  • DOI https://doi.org/10.1007/978-3-319-04852-9
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-319-04851-2
  • eBook ISBN 978-3-319-04852-9
  • Series ISSN 0302-9743
  • Series E-ISSN 1611-3349
  • Edition Number 1
  • Number of Pages XI, 501
  • Number of Illustrations 76 b/w illustrations, 0 illustrations in colour
  • Topics Cryptology
    Systems and Data Security
    Coding and Information Theory
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
IT & Software
Telecommunications
Law
Aerospace
Engineering
Finance, Business & Banking
Electronics