default search action
CT-RSA 2001: San Francisco, CA, USA
- David Naccache:
Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings. Lecture Notes in Computer Science 2020, Springer 2001, ISBN 3-540-41898-9
New Cryptosystems
- Detlef Hühnlein:
Faster Generation of NICE-Schnorr-Type Signatures. 1-12 - Iris Anshel, Michael Anshel, Benji Fisher, Dorian Goldfeld:
New Key Agreement Protocols in Braid Group Cryptography. 13-27
RSA
- Hovav Shacham, Dan Boneh:
Improving SSL Handshake Performance via Batching. 28-43 - Geneviève Arboit, Jean-Marc Robert:
From Fixed-Length Messages to Arbitrary-Length Messages Practical RSA Signature Padding Schemes. 44-51 - Ron Steinfeld, Yuliang Zheng:
An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. 52-62
Symmetric Cryptography
- Paul Onions:
On the Strength of Simply-Iterated Feistel Ciphers with Whitening Keys. 63-69 - Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw:
Analysis of SHA-1 in Encryption Mode. 70-83 - Kris Gaj, Pawel Chodowiec:
Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. 84-99
Gambling and Lotteries
- Eyal Kushilevitz, Tal Rabin:
Fair e-Lotteries and e-Casinos. 100-109 - Markus Jakobsson, David Pointcheval, Adam L. Young:
Secure Mobile Gambling. 110-125
Reductions, Constructions, and Security Proofs
- Daniel R. L. Brown, Don B. Johnson:
Formal Security Proofs for a Signature Scheme with Partial Message Recovery. 126-142 - Michel Abdalla, Mihir Bellare, Phillip Rogaway:
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. 143-158 - Tatsuaki Okamoto, David Pointcheval:
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. 159-175
Flaws and Attacks
- Markus Jakobsson, Susanne Wetzel:
Security Weaknesses in Bluetooth. 176-191 - Colin D. Walter, Susan Thompson:
Distinguishing Exponent Digits by Observing Modular Subtractions. 192-207 - Marc Joye, Jean-Jacques Quisquater, Moti Yung:
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. 208-222
Implementation
- Alexander Tiountchik, Elena Trichina:
Modular Exponentiation on Fine-Grained FPGA. 223-234 - Elena Trichina, Alexander Tiountchik:
Scalable Algorithm for Montgomery Multiplication and Its Implementation on the Coarse-Grain Reconfigurable Chip. 235-249 - Michael Brown, Darrel Hankerson, Julio César López-Hernández, Alfred Menezes:
Software Implementation of the NIST Elliptic Curves Over Prime Fields. 250-265 - Nicolas T. Courtois:
The Security of Hidden Field Equations (HFE). 266-281
Multivariate Cryptography
- Jacques Patarin, Nicolas T. Courtois, Louis Goubin:
QUARTZ, 128-Bit Long Digital Signatures. 282-297 - Jacques Patarin, Nicolas T. Courtois, Louis Goubin:
FLASH, a Fast Multivariate Signature Algorithm. 298-307
Number Theoretic Problems
- Alfred Menezes, Minghua Qu:
Analysis of the Weil Descent Attack of Gaudry, Hess and Smart. 308-318 - Jean-Pierre Seifert:
Using Fewer Qubits in Shor's Factorization Algorithm Via Simultaneous Diophantine Approximation. 319-327
Passwords and Credentials
- Amir Herzberg, Yosi Mass:
Relying Party Credentials Framework. 328-343 - David P. Jablon:
Password Authentication Using Multiple Servers. 344-360 - Philip D. MacKenzie:
More Efficient Password-Authenticated Key Exchange. 361-377
Protocols I
- Yacov Yacobi:
Improved Boneh-Shaw Content Fingerprinting. 378-391 - Yuji Watanabe, Goichiro Hanaoka, Hideki Imai:
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. 392-407 - Ari Juels:
Targeted Advertising ... And Privacy Too. 408-424
Protocols II
- Philippe Golle, Ilya Mironov:
Uncheatable Distributed Computations. 425-440 - Michel Abdalla, Sara K. Miner, Chanathip Namprempre:
Forward-Secure Threshold Signature Schemes. 441-456 - Marc Fischlin:
A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires. 457-472
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.