This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014. The 25 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cryptanalysis, digital signatures, protocols, hash function cryptanalysis, and applications of cryptographic primitives.Algorithm: Setup(1Ir, N) 1 (MPK, MSK) a Setup(1Ir, N) 2 H a$ Hsu Algorithm: KeyGen(MPK, MSK, i) 1 ski a KeyGen(MPK , MSK , i) 2 return ski 3 MPK := (MPK, H, G) 4 ... 6 Extensions and Future Work As in the case of broadcast encryption, one may consider extensions of the notion of ... In particular, while broadcast steganography natively protects the recipientsa#39; identities from outsiders, it does not aim toanbsp;...
|Title||:||Topics in Cryptology -- CT-RSA 2014|
|Publisher||:||Springer - 2014-02-18|