default search action
INDOCRYPT 2010: Hyderabad, India
- Guang Gong, Kishan Chand Gupta:
Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings. Lecture Notes in Computer Science 6498, Springer 2010, ISBN 978-3-642-17400-1
Invitd Talk
- Neal Koblitz:
Getting a Few Things Right and Many Things Wrong. 1
Security of RSA and Multivariate Schemes
- Santanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra:
Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions. 2-16 - Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann:
Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks. 17-32 - Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann:
CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key. 33-48
Security Analysis, Pseudorandom Permutations and Applications
- Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu:
Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols. 49-68 - Avradip Mandal, Jacques Patarin, Valérie Nachef:
Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations. 69-81 - Mridul Nandi:
The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants. 82-97 - Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan:
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. 98-114
Invited Talk
- Bart Preneel:
Cryptographic Hash Functions: Theory and Practice. 115-117
Hash Functions
- Ashish Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Masoumeh Safkhani, Majid Naderi:
Cryptanalysis of Tav-128 Hash Function. 118-130 - Meltem Sönmez Turan, Erdener Uyan:
Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing. 131-143 - Mridul Nandi, Souradyuti Paul:
Speeding Up the Wide-Pipe: Secure and Fast Hashing. 144-162
Attacks on Block Ciphers and Stream Ciphers
- Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks:
New Boomerang Attacks on ARIA. 163-175 - Gregory V. Bard, Nicolas T. Courtois, Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang:
Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers. 176-196 - Cihangir Tezcan:
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA. 197-209 - Paul Stankovski:
Greedy Distinguishers and Nonrandomness Detectors. 210-226
Fast Cryptographic Computation
- Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity. 227-237 - Fabien Herbaut, Pierre-Yvan Liardet, Nicolas Méloni, Yannick Teglia, Pascal Véron:
Random Euclidean Addition Chain Generation and Its Application to Point Multiplication. 238-261
Cryptanalysis of AES
- Emmanuel Prouff, Thomas Roche:
Attack on a Higher-Order Masking of the AES Based on Homographic Functions. 262-281 - Hamid Mala, Mohammad Dakhilalian, Vincent Rijmen, Mahmoud Modarres-Hashemi:
Improved Impossible Differential Cryptanalysis of 7-Round AES-128. 282-291 - Yoni De Mulder, Brecht Wyseur, Bart Preneel:
Cryptanalysis of a Perturbated White-Box AES Implementation. 292-310
Efficient Implementation
- Raymond Manley, David Gregg:
A Program Generator for Intel AES-NI Instructions. 311-327 - Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:
ECC2K-130 on NVIDIA GPUs. 328-346 - Sourav Sen Gupta, Koushik Sinha, Subhamoy Maitra, Bhabani P. Sinha:
One Byte per Clock: A Novel RC4 Hardware. 347-363
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.