Advertisement

Topics in Cryptology –- CT-RSA 2015

The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings

  • Kaisa Nyberg

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9048)

Also part of the Security and Cryptology book sub series (LNSC, volume 9048)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Timing Attacks

    1. Front Matter
      Pages 1-1
    2. Joop van de Pol, Nigel P. Smart, Yuval Yarom
      Pages 3-21
    3. Billy Bob Brumley
      Pages 22-34
  3. Design and Analysis of Block Ciphers

    1. Front Matter
      Pages 35-35
    2. Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
      Pages 37-58
    3. Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
      Pages 59-83
  4. Attribute and Identity Based Encryption

  5. Membership

    1. Front Matter
      Pages 125-125
    2. David Derler, Christian Hanser, Daniel Slamanig
      Pages 127-144
    3. Olivier Blazy, Céline Chevalier, Damien Vergnaud
      Pages 145-164
  6. Secure and Efficient Implementation of AES Based Cryptosystems

    1. Front Matter
      Pages 165-165
    2. Conrado P. L. Gouvêa, Julio López
      Pages 167-180
    3. Junwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu
      Pages 181-198
  7. Chosen Ciphertext Attacks in Theory and Practice

    1. Front Matter
      Pages 199-199
    2. Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
      Pages 201-219
    3. Florian Maury, Jean-René Reinhard, Olivier Levillain, Henri Gilbert
      Pages 220-236
  8. Algorithms for Solving Hard Problems

    1. Front Matter
      Pages 237-237
    2. Wei Wei, Mingjie Liu, Xiaoyun Wang
      Pages 239-257
    3. Koji Nuida, Naoto Itakura, Kaoru Kurosawa
      Pages 258-269
  9. Constructions of Hash Functions and Message Authentication Codes

    1. Front Matter
      Pages 271-271
    2. Jonathan Katz, Stefan Lucks, Aishwarya Thiruvengadam
      Pages 273-290
  10. Secure Multiparty Computation

    1. Front Matter
      Pages 309-309
    2. Marcin Andrychowicz, Ivan Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou
      Pages 311-329
  11. Authenticated Encryption

    1. Front Matter
      Pages 351-351
    2. Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer
      Pages 371-387
  12. Detecting and Tracing Malicious Activities

    1. Front Matter
      Pages 389-389
    2. Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
      Pages 410-428
  13. Implementation Attacks on Exponentiation Algorithms

    1. Front Matter
      Pages 429-429
    2. Bertram Poettering, Dale L. Sibborn
      Pages 449-465
  14. Homomorphic Encryption and Its Applications

    1. Front Matter
      Pages 467-467
    2. Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang
      Pages 469-486
    3. Guilhem Castagnos, Fabien Laguillaumie
      Pages 487-505
  15. Back Matter
    Pages 507-508

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash functions and message authentication codes, secure multiparty computation, authenticated encryption, detecting and tracing malicious activities, implentation attacks on exponentiation algorithms, and homomorphic encryption and its applications.

Keywords

Authorization Block and Stream Ciphers Cryptanalysis and other attacks Cryptography Digital rights management Digital signatures Hash functions and message authentication codes Information Intrusion/anomaly detection and malware mitigation Key management Mathematical foundations of cryptography Privacy-preserving protocols Pseudonymity, anonymity and untraceability Public key (asymmetric) techniques Public key encryption Quantum cryptography Security in hardware Side-channel analysis and countermeasures Software security engineering Symmetric cryptography and hash functions Theoretic techniques

Editors and affiliations

  • Kaisa Nyberg
    • 1
  1. 1.Aalto University School of ScienceEspooFinland

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-16715-2
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-16714-5
  • Online ISBN 978-3-319-16715-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace