These are the proceedings of CT-RSA 2003, the Cryptographers' Track at RSA Conference 2003. The proceedings of CT-RSA 2001 and CT-RSA 2002 were published in Springer-Verlag's Lecture Notes in Computer Science series as LNCS 2020 and LNCS 2271, respectively. The Cryptographers' Track is one of the many parallel tracks of the RSA Conference. With many thousands of participants, the RSA Conference is the largest security and cryptography event of the year. There were 97 submitted contributions this year, of which 26, or 27%, were selected for presentation. The program also included two invited...
These are the proceedings of CT-RSA 2003, the Cryptographers' Track at RSA Conference 2003. The proceedings of CT-RSA 2001 and CT-RSA 2002 were publis...
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot Spring, Japan, in December 2010.The 25 full papers presented were carefully reviewed and selected from 64 submissions. The contributions are organized in topical sections on: efficient software implementation; digital signatures; cryptographic protocols; key agreement; applications - code generation, time-released encryption, and cloud computing; point encoding and pairing-friendly curves; ID-based encryption schemes; and efficient hardware,...
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot S...
Fault attacks is an active area of research in cryptography, currently explored in hundreds of research papers and dedicated conferences. This book is the first comprehensive treatment of the subject covering both the theory and practice of these attacks as well as defense techniques. ... Preventing fault attacks without sacrificing performance is nontrivial. Over the years a number of innovative ideas have been proposed for efficiently verifying cryptographic computations. Many defense strategies are described in the book, some of which are already deployed in real-world cryptographic...
Fault attacks is an active area of research in cryptography, currently explored in hundreds of research papers and dedicated conferences. This book is...
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks. Preventing fault attacks...
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in s...
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography and leakage and fault attacks.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced App...
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes.
As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of...
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based c...