Topics in Cryptology -- CT-RSA 2014

Topics in Cryptology -- CT-RSA 2014

4.11 - 1251 ratings - Source

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014. The 25 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cryptanalysis, digital signatures, protocols, hash function cryptanalysis, and applications of cryptographic primitives.Algorithm: Setup(1Ir, N) 1 (MPK, MSK) a† Setup(1Ir, N) 2 H a†$ Hsu Algorithm: KeyGen(MPK, MSK, i) 1 ski a† KeyGen(MPK , MSK , i) 2 return ski 3 MPK := (MPK, H, G) 4 ... 6 Extensions and Future Work As in the case of broadcast encryption, one may consider extensions of the notion of ... In particular, while broadcast steganography natively protects the recipientsa#39; identities from outsiders, it does not aim toanbsp;...

Title:Topics in Cryptology -- CT-RSA 2014
Author:Josh Benaloh
Publisher:Springer - 2014-02-18


You Must CONTINUE and create a free account to access unlimited downloads & streaming