


default search action
25th INDOCRYPT 2024: Chennai, India - Part II
- Sourav Mukhopadhyay, Pantelimon Stanica:

Progress in Cryptology - INDOCRYPT 2024 - 25th International Conference on Cryptology in India, Chennai, India, December 18-21, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15496, Springer 2025, ISBN 978-3-031-80310-9
Cryptanalysis
- Trevor Yap

, Stjepan Picek
, Shivam Bhasin
:
OccPoIs: Points of Interest Based on Neural Network's Key Recovery in Side-Channel Analysis Through Occlusion. 3-28 - Nitin Kumar Sharma

, Sabyasachi Dey, Santanu Sarkar, Subhamoy Maitra:
On Improved Cryptanalytic Results Against ChaCha for Reduced Rounds $\ge 7$. 29-52 - Amit Jana

:
Differential Fault Attack on Ascon Cipher. 53-72 - Debendranath Das

, Anirban Ghatak
, Indivar Gupta, Sabyasachi Karati, Arindam Mandal:
An Improved Differential Fault Attack on the Stream Cipher Espresso. 73-89 - Emanuele Bellini

, Mattia Formenti
, David Gérault
, Juan Grados
, Anna Hambitzer
, Yun Ju Huang
, Paul Huynh
, Mohamed Rachidi
, Raghvendra Rohit
, Sharwan K. Tiwari
:
CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher. 90-113 - Amrita Bose

, Debranjan Pal
, Dipanwita Roy Chowdhury:
Deep Learning-Based Differential Distinguishers for Cryptographic Sequences. 114-133 - Shibam Ghosh, Anup Kumar Kundu, Mostafizar Rahman, Dhiman Saha:

BIZness: Bit Invariant Zero-Sum Property Based on Division Trail. 134-155
Post-quantum Cryptography
- David Jao, Jeanne Laflamme:

Isogeny Interpolation and the Computation of Isogenies from Higher Dimensional Representations. 159-179 - Pratima Jana, Ratna Dutta:

CPAKE: An Identity-Binding Password Authenticated Key Exchange from Quasi-cyclic Codes. 180-200 - Santanu Sarkar:

Enhanced Bound for the Commutative Isogeny Hidden Number Problem in CSURF. 201-211 - Aditya Singh Rawat

, Mahabir Prasad Jhanwar:
Post-Quantum DNSSEC with Faster TCP Fallbacks. 212-236 - Abhraneel Dutta, Emrah Karagoz

, Edoardo Persichetti, Pakize Sanal:
Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography. 237-256 - Ekta Bindal

, Abhay Kumar Singh
, Manoj Kumar Singh:
A Novel PQ-KEM Based on Coding Theory. 257-278
Blockchain and Cloud Computing
- Rishiraj Bhattacharyya

, Avradip Mandal, Meghna Sengupta:
Secure Vault Scheme in the Cloud Operating Model. 281-303 - Debendranath Das

, Subhamoy Maitra
:
Blockchain-Enabled Distributed Rummy: Proof for the Designers in Online Skill Gaming Industries. 304-326

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














