default search action
INDOCRYPT 2012: Kolkata, India
- Steven D. Galbraith, Mridul Nandi:
Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7668, Springer 2012, ISBN 978-3-642-34930-0
Invited Papers
- Vinod Vaikuntanathan:
How to Compute on Encrypted Data. 1-15 - Orr Dunkelman:
From Multiple Encryption to Knapsacks - Efficient Dissection of Composite Problems. 16 - Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart:
Using the Cloud to Determine Key Strengths. 17-39
Protocol
- Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek:
A Unified Characterization of Completeness and Triviality for Secure Function Evaluation. 40-59 - Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi:
On the Non-malleability of the Fiat-Shamir Transform. 60-79 - Arpita Maitra, Goutam Paul:
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84. 80-99 - Chaya Ganesh, Vipul Goyal, Satyanarayana V. Lokam:
On-Line/Off-Line Leakage Resilient Secure Computation Protocols. 100-119
Side Channel
- Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi:
Leakage Squeezing of Order Two. 120-139 - Christophe Clavier, Benoit Feix, Georges Gagnerot, Christophe Giraud, Mylène Roussellet, Vincent Verneuil:
ROSETTA for Single Trace Analysis. 140-155
Hash Functions and Stream Cipher
- Mario Lamberger, Florian Mendel, Vincent Rijmen:
Collision Attack on the Hamsi-256 Compression Function. 156-171 - Tuomas Kortelainen, Ari Vesanen, Juha Kortelainen:
Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks. 172-190 - Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
A Differential Fault Attack on the Grain Family under Reasonable Assumptions. 191-208 - Thierry P. Berger, Marine Minier:
Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs. 209-224
Cryptanalysis of Block Ciphers
- Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean:
Faster Chosen-Key Distinguishers on Reduced-Round AES. 225-243 - Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic:
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher. 244-264 - Yu Sasaki:
Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds. 265-282 - Shengbao Wu, Mingsheng Wang:
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers. 283-302
Time Memory Trade-Off
- Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, Sung-Ryul Kim:
High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System. 303-316 - Daniel J. Bernstein, Tanja Lange:
Computing Small Discrete Logarithms Faster. 317-338
Hardware
- Ingo von Maurich, Tim Güneysu:
Embedded Syndrome-Based Hashing. 339-357 - Thomas Plos, Christoph Dobraunig, Markus Hofinger, Alexander Oprisnik, Christoph Wiesmeier, Johannes Wiesmeier:
Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA. 358-377
Elliptic Curve
- David Kohel:
Efficient Arithmetic on Elliptic Curves in Characteristic 2. 378-398 - Hongfeng Wu, Chunming Tang, Rongquan Feng:
A New Model of Binary Elliptic Curves. 399-411 - Xusheng Zhang, Dongdai Lin:
Analysis of Optimum Pairing Products at High Security Levels. 412-430 - Robert Drylo:
Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian. 431-453
Digital Signature
- Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk:
Faster Batch Forgery Identification. 454-473 - Grégory Landais, Nicolas Sendrier:
Implementing CFS. 474-488
Symmetric Key Design and Provable Security
- Jean-Philippe Aumasson, Daniel J. Bernstein:
SipHash: A Fast Short-Input PRF. 489-508 - Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj:
A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA. 509-527 - Aslí Bay, Atefeh Mashatan, Serge Vaudenay:
Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers. 528-544 - Donghoon Chang:
Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme. 545-563
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.