INDOCRYPT 2006: Kolkata, India

Invited Talk

Symmetric Cryptography: Attacks

Hash Functions

Provable Security: Key Agreement

Invited Talk

Provable Security: Public Key Cryptography

Symmetric Cryptography: Design

Modes of Operation and Message Authentication Codes

Fast Implementation of Public Key Cryptography

ID-Based Cryptography

Embedded System and Side Channel Attacks