This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2008, CT-RSA 2008, held in San Francisco, CA, USA in April 2008.
The 26 revised full papers presented together with the abstract of 1 invited talk were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message authentication codes, improved aes implementations, public key encryption with special properties, side channel cryptanalysis, cryptography for limited devices, invited talk, key exchange, cryptanalysis, and cryptographic protocols.
Author(s): Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro (auth.), Tal Malkin (eds.)
Series: Lecture Notes in Computer Science 4964 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008
Language: English
Pages: 437
Tags: Data Encryption; Discrete Mathematics in Computer Science; Systems and Data Security; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks
Front Matter....Pages -
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack....Pages 1-18
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes....Pages 19-35
Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks....Pages 36-51
Efficient Fully-Simulatable Oblivious Transfer....Pages 52-70
Separation Results on the “One-More” Computational Problems....Pages 71-87
An Efficient Protocol for Fair Secure Two-Party Computation....Pages 88-105
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles....Pages 106-120
Legally-Enforceable Fairness in Secure Two-Party Computation....Pages 121-137
Security of NMAC and HMAC Based on Non-malleability....Pages 138-154
Aggregate Message Authentication Codes....Pages 155-169
Boosting AES Performance on a Tiny Processor Core....Pages 170-186
A Fast and Cache-Timing Resistant Implementation of the AES....Pages 187-202
Identity-Based Threshold Key-Insulated Encryption without Random Oracles....Pages 203-220
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption....Pages 221-238
Public-Key Encryption with Non-interactive Opening....Pages 239-255
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL....Pages 256-273
Fault Analysis Study of IDEA....Pages 274-287
Susceptibility of UHF RFID Tags to Electromagnetic Analysis....Pages 288-300
Online/Offline Signature Schemes for Devices with Limited Computing Capabilities....Pages 301-317
RFID Security: Tradeoffs between Security and Efficiency....Pages 318-332
Program Obfuscation and One-Time Programs....Pages 333-334
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework....Pages 335-351
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange....Pages 352-369
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1....Pages 370-386
Small Secret Key Attack on a Variant of RSA (Due to Takagi)....Pages 387-406
Super-Efficient Verification of Dynamic Outsourced Databases....Pages 407-424
A Latency-Free Election Scheme....Pages 425-436
Back Matter....Pages -