Topics in Cryptology - CT-RSA 2009: The Cryptographers' Track at the RSA Conference 2009, San Francisco,CA, USA, April 20-24, 2009, Proceedings

Front Cover
Marc Fischlin
Springer Science & Business Media, Mar 26, 2009 - Computers - 482 pages
The 2009 RSA conference was held in San Francisco, USA, during April 20-24. The conference is devoted to security-related topics and, as part of this, hosts a distinguished track for cryptographic research. Since 2001 the proceedings of this Cryptographers' Track (CT-RSA) have been published in the series Lecture Notes in Computer Science of Springer. The proceedings of CT-RSA 2009 contain 31 papers selected from 93 s- missions, covering a wide variety of cryptographic areas. Each submission was anonymizedforthereviewingprocessandwasassignedto atleastthreeofthe25 ProgramCommittee members. Submissions co-authoredby committee members were assigned to at least ?ve members. After carefully considering more than 15,000 lines (more than 100,000 words) of reviews and online discussions, the committeeselected31submissionsforacceptance. Theprogramalsoincludedan invited talk by Kenny Paterson entitled “Cryptography and Secure Channels. ” Iwouldliketothankalltheauthorswhosubmittedpapers. Iamalsoindebted to the Program Committee members and all external reviewers for their vol- tary work. The committee's work was tremendously simpli?ed by Shai Halevi's submission software and his support. I would also like to thank the CT-RSA Steering Committee for electing me as Chair, and all the people from the RSA conference team for their support, especially Bree LaBollita.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

AdaptiveID Secure Revocable IdentityBased Encryption
1
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBEtoPKE Transformations
16
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
32
Attacks on the DECT Authentication Mechanisms
48
ComparisonBased Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v21
66
Key Insulation and Intrusion Resilience Over a Public Channel
84
Statistically Hiding Sets
100
Adaptively Secure TwoParty Computation With Erasures
117
CommunicationEfficient Private Protocols for Longest Common Subsequence
265
KeyPrivate Proxy ReEncryption
279
Dynamic Universal Accumulators for DDH Groups and Their Application to AttributeBased Anonymous Credential Systems
295
Practical Short Signature Batch Verification
309
SingleLayer Fractal Hash Chain Traversal with Almost Optimal Complexity
325
Recursive DoubleSize Modular Multiplications without Extra Cost for Their Quotients
340
ConstantRounds AlmostLinear BitDecomposition of Secret Shared Values
357
Local Sequentiality Does Not Help for Concurrent Composition
372

Short Redactable Signatures Using Random Trees
133
Divisible OnLineOffLine Signatures
148
Speeding up Collision Search for ByteOriented Hash Functions
164
in the ZemorTillich Hash Function New Attacks and Reduced Variants with Equivalent Security
182
A Statistical Saturation Attack against the Block Cipher PRESENT
195
Practical Attacks on Masked Hardware
211
Cryptanalysis of CTC2
226
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
240
Square a New Multivariate Encryption Scheme
252
Breaking and Repairing Damgard et al Public Key Encryption Scheme with Noninteractive Opening
389
Strengthening Security of RSAOAEP
399
LeftToRight Implementations Are Also Vulnerable
414
Fault Analysis Attack Against an AES Prototype Chip Using RSL
429
Evaluation of the Detached Power Supply as SideChannel Analysis Countermeasure for Passive UHF RFID Tags
444
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
459
Author Index
481
Copyright

Other editions - View all

Common terms and phrases