LEADER 05705nam 22007695 450 001 996466246803316 005 20200703051216.0 010 $a3-642-36095-5 024 7 $a10.1007/978-3-642-36095-4 035 $a(CKB)3520000000003531 035 $a(SSID)ssj0000880080 035 $a(PQKBManifestationID)11524668 035 $a(PQKBTitleCode)TC0000880080 035 $a(PQKBWorkID)10872087 035 $a(PQKB)10852996 035 $a(DE-He213)978-3-642-36095-4 035 $a(MiAaPQ)EBC3093529 035 $a(PPN)168329751 035 $a(EXLCZ)993520000000003531 100 $a20130217d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTopics in Cryptology - CT- RSA 2013$b[electronic resource] $eThe Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings /$fedited by Ed Dawson 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XIV, 405 p. 68 illus.) 225 1 $aSecurity and Cryptology ;$v7779 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-36094-7 327 $aSide Channel Attacks I -- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.-Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL -- Digital Signatures I.-Fair Exchange of Short Signatures without Trusted Third Party -- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures -- Public-Key Encryption I -- Robust and Plaintext-Aware Variant of Signed ElGamal Encryption -- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks -- Cryptographic Protocols I -- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes -- Randomized Partial Checking Revisited -- Secure Implementation Methods -- Randomly Failed! The State of Randomness in Current Java Implementations -- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implementations for Grøstl -- Symmetric Key Primitives I -- Collisions for the WIDEA-8 Compression Function -- Finding Collisions for Round-Reduced SM3 -- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures -- Side Channel Attacks II -- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag -- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness -- Cryptographic Protocols II -- Cryptanalytic Attacks on MIFARE Classic Protocol -- Asynchronous Computational VSS with Reduced Communication Complexity -- Public-Key Encryption II.-Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 -- Solving BDD by Enumeration: An Update -- Identity-Based Encryption -- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions -- Accountable Authority Identity-Based Encryption with Public Traceability -- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption -- Symmetric Key Primitives II -- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users -- A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy -- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis. 330 $aThis book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption. 410 0$aSecurity and Cryptology ;$v7779 606 $aData encryption (Computer science) 606 $aComputer security 606 $aOperating systems (Computers) 606 $aE-commerce 606 $aComputer communication systems 606 $aCoding theory 606 $aInformation theory 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aOperating systems (Computers). 615 0$aE-commerce. 615 0$aComputer communication systems. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aOperating Systems. 615 24$ae-Commerce/e-business. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 676 $a005.82 702 $aDawson$b Ed$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466246803316 996 $aTopics in Cryptology - CT- RSA 2013$92594862 997 $aUNISA