Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. (English) Zbl 1134.94002

Lecture Notes in Computer Science 4964. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). xi, 437 p. (2008).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1132.94001).
Indexed articles:
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru, Security of MD5 challenge and response: Extension of APOP password recovery attack, 1-18 [Zbl 1153.94428]
Fouque, Pierre-Alain; Leurent, Gaëtan, Cryptanalysis of a hash function based on quasi-cyclic codes, 19-35 [Zbl 1159.94360]
Gauravaram, Praveen; Kelsey, John, Linear-XOR and additive checksums don’t protect Damgård-Merkle hashes from generic attacks, 36-51 [Zbl 1153.94379]
Lindell, Andrew Y., Efficient fully-simulatable oblivious transfer, 52-70 [Zbl 1153.94406]
Bresson, Emmanuel; Monnerat, Jean; Vergnaud, Damien, Separation results on the “one-more” computational problems, 71-87 [Zbl 1153.94355]
Kiraz, Mehmet S.; Schoenmakers, Berry, An efficient protocol for fair secure two-party computation, 88-105 [Zbl 1153.94402]
Huang, Qiong; Yang, Guomin; Wong, Duncan S.; Susilo, Willy, Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles, 106-120 [Zbl 1153.94394]
Lindell, Andrew Y., Legally-enforceable fairness in secure two-party computation, 121-137 [Zbl 1153.94407]
Fischlin, Marc, Security of NMAC and HMAC based on non-malleability, 138-154 [Zbl 1153.94376]
Katz, Jonathan; Lindell, Andrew Y., Aggregate message authentication codes, 155-169 [Zbl 1153.94398]
Tillich, Stefan; Herbst, Christoph, Boosting AES performance on a tiny processor core, 170-186 [Zbl 1153.68375]
Könighofer, Robert, A fast and cache-timing resistant implementation of the AES, 187-202 [Zbl 1153.68373]
Weng, Jian; Liu, Shengli; Chen, Kefei; Zheng, Dong; Qiu, Weidong, Identity-based threshold key-insulated encryption without random oracles, 203-220 [Zbl 1153.94437]
Kiltz, Eike; Vahlis, Yevgeniy, CCA2 secure IBE: Standard model efficiency through authenticated symmetric encryption, 221-238 [Zbl 1153.94400]
Damgård, Ivan; Hofheinz, Dennis; Kiltz, Eike; Thorbek, Rune, Public-key encryption with non-interactive opening, 239-255 [Zbl 1161.94393]
Acıiçmez, Onur; Schindler, Werner, A vulnerability in RSA implementations due to instruction cache analysis and its demonstration on OpenSSL, 256-273 [Zbl 1153.94341]
Clavier, Christophe; Gierlichs, Benedikt; Verbauwhede, Ingrid, Fault analysis study of IDEA, 274-287 [Zbl 1153.94361]
Plos, Thomas, Susceptibility of UHF RFID tags to electromagnetic analysis, 288-300 [Zbl 1153.94424]
Yu, Ping; Tate, Stephen R., Online/offline signature schemes for devices with limited computing capabilities, 301-317 [Zbl 1153.94441]
Damgård, Ivan; Pedersen, Michael Østergaard, RFID security: Tradeoffs between security and efficiency, 318-332 [Zbl 1138.94359]
Goldwasser, Shafi, Program obfuscation and one-time programs, 333-334 [Zbl 1153.68372]
Abdalla, Michel; Catalano, Dario; Chevalier, Céline; Pointcheval, David, Efficient two-party password-based key exchange protocols in the UC framework, 335-351 [Zbl 1153.94340]
Jarecki, Stanisław; Kim, Jihye; Tsudik, Gene, Beyond secret handshakes: Affiliation-hiding authenticated key exchange, 352-369 [Zbl 1153.94396]
Lu, Jiqiang; Kim, Jongsung; Keller, Nathan; Dunkelman, Orr, Improving the efficiency of impossible differential cryptanalysis of reduced camellia and MISTY1, 370-386 [Zbl 1153.94408]
Itoh, Kouichi; Kunihiro, Noboru; Kurosawa, Kaoru, Small secret key attack on a variant of RSA (due to Takagi), 387-406 [Zbl 1161.94408]
Goodrich, Michael T.; Tamassia, Roberto; Triandopoulos, Nikos, Super-efficient verification of dynamic outsourced databases, 407-424 [Zbl 1153.68368]
Gjøsteen, Kristian, A latency-free election scheme, 425-436 [Zbl 1153.68371]


94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest


Zbl 1132.94001


Full Text: DOI