Global Sales Contact List

Contact   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

RSA Laboratories

CryptoBytes Technical Newsletter

Welcome to CryptoBytes, the technical newsletter from RSA Laboratories, the research center of RSA, The Security Division of EMC.

CryptoBytes is a free publication that appears on an occasional basis. While print copies may sometimes be distributed, publication is primarily electronic. All issues of CryptoBytes are available on this web page.

Volume 8, No. 1, Winter 2007 (Acrobat .PDF, 573k)
Identity Theft: An Introduction; Why Anti-Phishing Toolbars Do Not Work; Messin’ With Texas – Deriving Mother’s Maiden Names Using Public Records

Volume 7, No. 2, Fall 2004 (Acrobat .PDF, 435k)
Electronic Voting Systems — Is Brazil Ahead of its Time?; Misassessment of Security in Computer-Based Election Systems; Secret Ballot Receipts: True Voter-Verifiable Elections

Volume 7, No. 1, Spring 2004 (Acrobat .PDF, 835k)
Mitigating Insider Threats to RSA Key Generation; Secure Verification of Location Claims; Manual Authentication for Wireless Devices

Volume 6, No. 2 - Summer 2003 (Acrobat .PDF, 412k)
A Survey of Two Signature Aggregation Techniques; On the Cost of Factoring RSA-1024; Physical One-Way Functions

Volume 6, No. 1 - Spring 2003 (Acrobat .PDF, 700k)
Radio-Frequency Identification: Security Risks and Challenges; Identity-based Encryption: a Survey; Advances in Side-Channel Cryptanalysis, Electromagnetic Analysis and Template Attacks

Volume 5, No. 2 - Summer/Fall 2002 (Acrobat .PDF, 1.3 mb)
The TESLA Broadcast Authentication Protocol; Forward-Secure Signatures with Optimal Signing and Verifying; Attacks on RC4 and WEP

Volume 5, No. 1 - Winter/Spring 2002 (Acrobat .PDF, 427k)
Fast Variants of RSA; How to Encrypt Properly with RSA; Composite-Residuosity Based Cryptography: An Overview

Volume 4, No. 2 - Winter 1999 (Acrobat .PDF, 332k)
Breaking DES; First Advanced Encryption Standard (AES) Candidate Conference; Attacking Elliptic Curve Cryptosystems Using the Parallel Pollard rho Method

Volume 4, No. 1 - Summer 1998 (Acrobat .PDF, 470k)
Performance Comparison of Public-Key Cryptosystems; Smart Card Crypto-Coprocessors for Public-Key Cryptography; Chaffing and Winnowing: Confidentiality without Encryption; DES, Triple-DES and AES; DES-II Challenges Solved

Volume 3, No. 2 - Autumn 1997 (Acrobat .PDF, 301k)
On the Foundations of Modern Cryptography; Efficient DES Key Search  An Update; The RSA Data Security DES Challenge II; The Cryptographic Hash Function RIPEMD-160; PKCS: The Next Generation, Chapter 2

Volume 3, No. 1 - Spring 1997 (Acrobat .PDF, 285k)
Proactive Security: Long-term Protection Against Break-ins; Fast Generation of Random, Strong RSA Primes; Algorithms Update, Standards Update, Announcements

Volume 2, No. 3 - Winter 1997 (Acrobat .PDF, 405k)
How Exhausting is Exhaustive search?; An Introduction to Threshold Cryptography; The RC5 Encryption Algorithm: Two Years On

Volume 2, No. 2 - Summer 1996 (Acrobat .PDF, 357k)
The Status of MD5 After a Recent Attack; RSA-130 Factored; The Security of DESX; At the Newton Institute: Coding Theory, Cryptology, and Computer Security

Volume 2, No. 1 - Spring 1996 (Acrobat .PDF, 210k)
Asymmetric Encryption: Evolution and Enhancements; Payword and Micromint: Two Simple Micropayment Schemes; Message Authentication Using Hash Functions: the HMAC Construction

Volume 1, No. 3 - Autumn 1995 (Acrobat .PDF, 320k)
RSA for Paranoids; The Secure Use of RSA; How Do Digital Time-Stamps Support Digital Signatures

Volume 1, No. 2 - Summer 1995 (Acrobat .PDF, 390k)
Elliptic Curve Cryptosystems; The Future of Integer Factorization; On the Security of the RC5 Encryption Algorithm

Volume 1, No. 1 - Spring 1995 (Acrobat .PDF, 365k)
The Impending Demise of RSA?; Message Authentication with MD5; The RC5 Encryption Algorithm

About CryptoBytes

Top of Page