


default search action
INDOCRYPT 2013: Mumbai, India
- Goutam Paul, Serge Vaudenay:

Progress in Cryptology - INDOCRYPT 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings. Lecture Notes in Computer Science 8250, Springer 2013, ISBN 978-3-319-03514-7
Provable Security
- Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang

:
Key-Private Proxy Re-encryption under LWE. 1-18 - Ashish Choudhury

:
Breaking the ${\mathcal{O}}(n|C|)$ Barrier for Unconditionally Secure Asynchronous Multiparty Computation - (Extended Abstract). 19-37 - John O. Pliam:

Alternating Product Ciphers: A Case for Provable Security Comparisons - (Extended Abstract). 38-49
Hash Functions and Signatures
- Marine Minier, Gaël Thomas:

An Integral Distinguisher on Grøstl-512 v3. 50-59 - Christian Hanser, Daniel Slamanig

:
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes. 60-77
Side Channel Attacks I
- Subhadeep Banik

, Anusha Chowdhury:
Improved Scan-Chain Based Attacks and Related Countermeasures. 78-97 - Aurélie Bauer, Éliane Jaulmes:

Correlation Analysis against Protected SFM Implementations of RSA. 98-115
Symmetric Key Cryptanalysis I
- Christophe Clavier, Quentin Isorez, Antoine Wurcker:

Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis. 116-135 - Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya

:
Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN. 136-148 - Céline Blondeau:

Improbable Differential from Impossible Differential: On the Validity of the Model. 149-160
Key Exchange and Secret Sharing
- Kazuki Yoneyama:

Compact Authenticated Key Exchange from Bounded CCA-Secure KEM. 161-178 - Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini:

On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection. 179-196
Side Channel Attacks II
- Benoit Feix, Vincent Verneuil:

There's Something about m-ary - Fixed-Point Scalar Multiplication Protected against Physical Attacks. 197-214 - Fabrizio De Santis, Michael Kasper, Stefan Mangard

, Georg Sigl, Oliver Stein, Marc Stöttinger
:
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective. 215-226
Efficient Implementation and Hardware
- Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:

Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors. 227-243 - Erich Wenger, Thomas Unterluggauer, Mario Werner:

8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors. 244-261 - Ayantika Chatterjee, Manish Kaushal, Indranil Sengupta:

Accelerating Sorting of Fully Homomorphic Encrypted Data. 262-273
Coding Theory in Cryptography
- Thierry P. Berger:

Construction of Recursive MDS Diffusion Layers from Gabidulin Codes. 274-285 - Vlad Dragoi

, Pierre-Louis Cayrel, Brice Colombier, Tania Richmond:
Polynomial Structures in Code-Based Cryptography. 286-296
Symmetric Key Cryptanalysis II
- Subhadeep Banik

, Santanu Sarkar, Raghu Kacker:
Security Analysis of the RC4+ Stream Cipher. 297-307 - Marine Minier:

On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible Differentials. 308-318

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














