Topics in Cryptology – CT-RSA 2007 The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings

The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security event of the year. The Cryptographers’ Track (CT- RSA) is a research conference within the RSA Conference. Starting in 2001, CT-RSA continues to its seventh year and is now regarded as one of the majo...

Full description

Bibliographic Details
Other Authors: Abe, Masayuki (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2006, 2006
Edition:1st ed. 2006
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Symmetric-Key Encryption
  • MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers
  • A Simple Related-Key Attack on the Full SHACAL-1
  • Signatures and Authentication
  • Impossibility Proofs for RSA Signatures in the Standard Model
  • Selecting Secure Passwords
  • Human Identification Through Image Evaluation Using Secret Predicates
  • Hash Functions
  • Cryptanalysis of Reduced Variants of the FORK-256 Hash Function
  • Second Preimages for SMASH
  • Digital Signatures (I)
  • A Practical Optimal Padding for Signature Schemes
  • Directed Transitive Signature Scheme
  • Identity-Based Multi-signatures from RSA
  • Cryptographic Protocols (I)
  • Improved Efficiency for Private Stable Matching
  • Compact E-Cash from Bounded Accumulator
  • Batch Processing of Interactive Proofs
  • Side-Channel Attacks (I)
  • Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls
  • Predicting Secret Keys Via Branch Prediction
  • Side-Channel Attacks (II)
  • Template Attacks on Masking—Resistance Is Futile
  • Differential Power Analysis of Stream Ciphers
  • Cache Based Remote Timing Attack on the AES
  • Cryptographic Protocols (II)
  • Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
  • Efficient Password-Authenticated Key Exchange Based on RSA
  • Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels
  • Digital Signatures (II)
  • A Practical and Tightly Secure Signature Scheme Without Hash Function
  • How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
  • Efficient Implementation
  • Public Key Cryptography and RFID Tags
  • A Bit-Slice Implementation of the Whirlpool Hash Function