Topics in Cryptology –- CT-RSA 2015

The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings

  • Kaisa Nyberg

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9048)

Also part of the Security and Cryptology book sub series (LNSC, volume 9048)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Timing Attacks

    1. Front Matter
      Pages 1-1
    2. Joop van de Pol, Nigel P. Smart, Yuval Yarom
      Pages 3-21
    3. Billy Bob Brumley
      Pages 22-34
  3. Design and Analysis of Block Ciphers

    1. Front Matter
      Pages 35-35
    2. Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger
      Pages 37-58
    3. Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang
      Pages 59-83
  4. Attribute and Identity Based Encryption

  5. Membership

    1. Front Matter
      Pages 125-125
    2. David Derler, Christian Hanser, Daniel Slamanig
      Pages 127-144
    3. Olivier Blazy, Céline Chevalier, Damien Vergnaud
      Pages 145-164
  6. Secure and Efficient Implementation of AES Based Cryptosystems

    1. Front Matter
      Pages 165-165
    2. Conrado P. L. Gouvêa, Julio López
      Pages 167-180
    3. Junwei Wang, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu
      Pages 181-198
  7. Chosen Ciphertext Attacks in Theory and Practice

    1. Front Matter
      Pages 199-199
    2. Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
      Pages 201-219
    3. Florian Maury, Jean-René Reinhard, Olivier Levillain, Henri Gilbert
      Pages 220-236
  8. Algorithms for Solving Hard Problems

    1. Front Matter
      Pages 237-237

About these proceedings


This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash functions and message authentication codes, secure multiparty computation, authenticated encryption, detecting and tracing malicious activities, implentation attacks on exponentiation algorithms, and homomorphic encryption and its applications.


Authorization Block and Stream Ciphers Cryptanalysis and other attacks Cryptography Digital rights management Digital signatures Hash functions and message authentication codes Information Intrusion/anomaly detection and malware mitigation Key management Mathematical foundations of cryptography Privacy-preserving protocols Pseudonymity, anonymity and untraceability Public key (asymmetric) techniques Public key encryption Quantum cryptography Security in hardware Side-channel analysis and countermeasures Software security engineering Symmetric cryptography and hash functions Theoretic techniques

Editors and affiliations

  • Kaisa Nyberg
    • 1
  1. 1.Aalto University School of ScienceEspooFinland

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-16714-5
  • Online ISBN 978-3-319-16715-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Consumer Packaged Goods