


default search action
INDOCRYPT 2012: Kolkata, India
- Steven D. Galbraith, Mridul Nandi:

Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7668, Springer 2012, ISBN 978-3-642-34930-0
Invited Papers
- Vinod Vaikuntanathan:

How to Compute on Encrypted Data. 1-15 - Orr Dunkelman:

From Multiple Encryption to Knapsacks - Efficient Dissection of Composite Problems. 16 - Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart:

Using the Cloud to Determine Key Strengths. 17-39
Protocol
- Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek:

A Unified Characterization of Completeness and Triviality for Secure Function Evaluation. 40-59 - Sebastian Faust, Markulf Kohlweiss

, Giorgia Azzurra Marson, Daniele Venturi
:
On the Non-malleability of the Fiat-Shamir Transform. 60-79 - Arpita Maitra, Goutam Paul:

Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84. 80-99 - Chaya Ganesh, Vipul Goyal, Satyanarayana V. Lokam:

On-Line/Off-Line Leakage Resilient Secure Computation Protocols. 100-119
Side Channel
- Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi:

Leakage Squeezing of Order Two. 120-139 - Christophe Clavier, Benoit Feix, Georges Gagnerot, Christophe Giraud, Mylène Roussellet, Vincent Verneuil:

ROSETTA for Single Trace Analysis. 140-155
Hash Functions and Stream Cipher
- Mario Lamberger, Florian Mendel

, Vincent Rijmen
:
Collision Attack on the Hamsi-256 Compression Function. 156-171 - Tuomas Kortelainen, Ari Vesanen, Juha Kortelainen:

Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks. 172-190 - Subhadeep Banik

, Subhamoy Maitra, Santanu Sarkar
:
A Differential Fault Attack on the Grain Family under Reasonable Assumptions. 191-208 - Thierry P. Berger, Marine Minier:

Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs. 209-224
Cryptanalysis of Block Ciphers
- Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean:

Faster Chosen-Key Distinguishers on Reduced-Round AES. 225-243 - Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic

:
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher. 244-264 - Yu Sasaki:

Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds. 265-282 - Shengbao Wu, Mingsheng Wang:

Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers. 283-302
Time Memory Trade-Off
- Jung Woo Kim, Jungjoo Seo, Jin Hong

, Kunsoo Park, Sung-Ryul Kim:
High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System. 303-316 - Daniel J. Bernstein, Tanja Lange:

Computing Small Discrete Logarithms Faster. 317-338
Hardware
- Ingo von Maurich

, Tim Güneysu
:
Embedded Syndrome-Based Hashing. 339-357 - Thomas Plos, Christoph Dobraunig

, Markus Hofinger, Alexander Oprisnik, Christoph Wiesmeier, Johannes Wiesmeier:
Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA. 358-377
Elliptic Curve
- David Kohel:

Efficient Arithmetic on Elliptic Curves in Characteristic 2. 378-398 - Hongfeng Wu

, Chunming Tang, Rongquan Feng:
A New Model of Binary Elliptic Curves. 399-411 - Xusheng Zhang, Dongdai Lin:

Analysis of Optimum Pairing Products at High Security Levels. 412-430 - Robert Drylo:

Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian. 431-453
Digital Signature
- Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk:

Faster Batch Forgery Identification. 454-473 - Grégory Landais, Nicolas Sendrier:

Implementing CFS. 474-488
Symmetric Key Design and Provable Security
- Jean-Philippe Aumasson, Daniel J. Bernstein:

SipHash: A Fast Short-Input PRF. 489-508 - Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj:

A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA. 509-527 - Aslí Bay, Atefeh Mashatan

, Serge Vaudenay:
Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers. 528-544 - Donghoon Chang:

Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme. 545-563

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














