


Остановите войну!
for scientists:


default search action
INDOCRYPT 2008: Kharagpur, India
- Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das:
Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings. Lecture Notes in Computer Science 5365, Springer 2008, ISBN 978-3-540-89753-8
Stream Ciphers
- Deike Priemuth-Schmid, Alex Biryukov
:
Slid Pairs in Salsa20 and Trivium. 1-14 - Shahram Khazaei
, Willi Meier:
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. 15-26 - Subhamoy Maitra, Goutam Paul:
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. 27-39 - Mete Akgün, Pinar Kavak, Hüseyin Demirci
:
New Results on the Key Scheduling Algorithm of RC4. 40-52
Cryptographic Hash Functions
- Dmitry Khovratovich:
Two Attacks on RadioGatún. 53-66 - Jean-Philippe Aumasson:
Faster Multicollisions. 67-77 - Jirí Vábek, Daniel Joscák, Milan Bohácek, Jirí Tuma
:
A New Type of 2-Block Collisions in MD5. 78-90 - Somitra Kumar Sanadhya
, Palash Sarkar:
New Collision Attacks against Up to 24-Step SHA-2. 91-103
Public-Key Cryptography - I
- Yanli Ren, Dawu Gu:
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model. 104-115 - Jun Furukawa, Nuttapong Attrapadung, Ryuichi Sakai, Goichiro Hanaoka:
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. 116-129 - Qiang Tang:
Type-Based Proxy Re-encryption and Its Construction. 130-144 - Laila El Aimani:
Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures. 145-157
Security Protocols
- Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff:
Concrete Security for Entity Recognition: The Jane Doe Protocol. 158-171 - Kazuki Yoneyama:
Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract). 172-184 - Arpita Patra, Ashish Choudhary
, C. Pandu Rangan:
Round Efficient Unconditionally Secure Multiparty Computation Protocol. 185-199 - Jing Yang, Zhenfeng Zhang:
A New Anonymous Password-Based Authenticated Key Exchange Protocol. 200-212 - Sébastien Canard, Amandine Jambert:
Group Key Management: From a Non-hierarchical to a Hierarchical Structure. 213-225
Hardware Attacks
- Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay:
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures. 226-238 - Michal Hojsík, Bohuslav Rudolf:
Floating Fault Analysis of Trivium. 239-250 - Andrey Bogdanov
, Ilya Kizhvatov, Andrei Pyshkin:
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. 251-265
Block Ciphers
- Michael Gorski, Stefan Lucks:
New Related-Key Boomerang Attacks on AES. 266-278 - Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim:
New Impossible Differential Attacks on AES. 279-293 - Orhun Kara
:
Reflection Cryptanalysis of Some Ciphers. 294-307 - Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller:
A Differential-Linear Attack on 12-Round Serpent. 308-321 - Daniel J. Bernstein, Peter Schwabe:
New AES Software Speed Records. 322-336
Public-Key Cryptography - II
- Subhamoy Maitra, Santanu Sarkar
:
A New Class of Weak Encryption Exponents in RSA. 337-349 - Mridul Nandi
:
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. 350-362
Cryptographic Hardware
- Jens-Peter Kaps:
Chai-Tea, Cryptographic Hardware Implementations of xTEA. 363-375 - Chester Rebeiro
, Debdeep Mukhopadhyay:
High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms. 376-388
Elliptic Curve Cryptography
- Gaetan Bisson, Takakazu Satoh:
More Discriminants with the Brezing-Weng Method. 389-399 - Sorina Ionica, Antoine Joux:
Another Approach to Pairing Computation in Edwards Coordinates. 400-413
Threshold Cryptography
- Kamer Kaya, Ali Aydin Selçuk
:
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. 414-425 - Huang Lin, Zhenfu Cao
, Xiaohui Liang, Jun Shao:
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. 426-436

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.