Pub Date : 2016-02-29DOI: 10.1007/978-3-319-29485-8_3
Avik Chakraborti, N. Datta, M. Nandi
{"title":"INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes","authors":"Avik Chakraborti, N. Datta, M. Nandi","doi":"10.1007/978-3-319-29485-8_3","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_3","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126047602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-29DOI: 10.1007/978-3-319-29485-8_26
J. Coron, J. Faugère, G. Renault, R. Zeitoun
{"title":"Factoring N=p^rq^s for Large r and s","authors":"J. Coron, J. Faugère, G. Renault, R. Zeitoun","doi":"10.1007/978-3-319-29485-8_26","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_26","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125849774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-29DOI: 10.1007/978-3-319-29485-8_14
Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi
{"title":"Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones","authors":"Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi","doi":"10.1007/978-3-319-29485-8_14","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_14","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128977866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-29DOI: 10.1007/978-3-319-29485-8_20
C. A. Melchor, Joris Barrier, S. Guelton, A. Guinet, M. Killijian, Tancrède Lepoint
{"title":"NFLlib: NTT-Based Fast Lattice Library","authors":"C. A. Melchor, Joris Barrier, S. Guelton, A. Guinet, M. Killijian, Tancrède Lepoint","doi":"10.1007/978-3-319-29485-8_20","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_20","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116715789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-29DOI: 10.1007/978-3-319-29485-8_13
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer
{"title":"ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs","authors":"Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer","doi":"10.1007/978-3-319-29485-8_13","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_13","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-29DOI: 10.1007/978-3-319-29485-8_17
Yanbin Pan
{"title":"Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014","authors":"Yanbin Pan","doi":"10.1007/978-3-319-29485-8_17","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_17","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131615545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-29DOI: 10.1007/978-3-319-29485-8_4
C. Boyd, Britta Hale, S. F. Mjølsnes, D. Stebila
{"title":"From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS","authors":"C. Boyd, Britta Hale, S. F. Mjølsnes, D. Stebila","doi":"10.1007/978-3-319-29485-8_4","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_4","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122273891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-29DOI: 10.1007/978-3-319-29485-8_21
Z. Li
{"title":"Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling","authors":"Z. Li","doi":"10.1007/978-3-319-29485-8_21","DOIUrl":"https://doi.org/10.1007/978-3-319-29485-8_21","url":null,"abstract":"","PeriodicalId":272917,"journal":{"name":"The Cryptographer's Track at RSA Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133164262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}