default search action
INDOCRYPT 2009: New Delhi, India
- Bimal K. Roy, Nicolas Sendrier:
Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings. Lecture Notes in Computer Science 5922, Springer 2009, ISBN 978-3-642-10627-9
Post-Quantum Cryptology
- Johannes Buchmann, Richard Lindner:
Secure Parameters for SWIFFT. 1-17 - Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe:
FSBday. 18-38
Key Agreement Protocols
- Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu:
Reusing Static Keys in Key Agreement Protocols. 39-56 - Colleen Swanson, David Jao:
A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols. 57-71
Side Channel Attacks
- Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin:
Fault Analysis of Rabbit: Toward a Secret Key Leakage. 72-87 - Julien Bringer, Hervé Chabanne, Thomas Icart:
On Physical Obfuscation of Cryptographic Algorithms. 88-103 - Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga:
Cache Timing Attacks on Clefia. 104-118
Symmetric Cryptology
- Thierry P. Berger, Marine Minier, Benjamin Pousse:
Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode. 119-135 - Sumanta Sarkar:
On the Symmetric Negabent Boolean Functions. 136-143 - Hüseyin Demirci, Ihsan Taskin, Mustafa Çoban, Adnan Baysal:
Improved Meet-in-the-Middle Attacks on AES. 144-156
Hash Functions
- Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. 157-168 - Kota Ideguchi, Dai Watanabe:
Second Preimage Attack on SHAMATA-512. 169-181 - Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu:
Towards Secure and Practical MACs for Body Sensor Networks. 182-198 - Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi:
Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions. 199-218 - Florian Mendel, Tomislav Nad:
A Distinguisher for the Compression Function of SIMD-512. 219-232
Number Theoretic Cryptology
- Mahabir Prasad Jhanwar, Rana Barua:
Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree. 233-247 - Conrado Porto Lopes Gouvêa, Julio López:
Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller. 248-262 - Dong Su, Kewei Lv:
A New Hard-Core Predicate of Paillier's Trapdoor Function. 263-271
Lightweight Cryptology
- Julien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji:
Private Interrogation of Devices via Identification Codes. 272-289 - Gildas Avoine, Christian Floerkemeier, Benjamin Martin:
RFID Distance Bounding Multistate Enhancement. 290-307 - Olivier Billet, Kaoutar Elkhiyaoui:
Two Attacks against the Ff RFID Protocol. 308-320
Signature Protocols
- Takahiro Matsuda, Kanta Matsuura, Jacob C. N. Schuldt:
Efficient Constructions of Signcryption Schemes and Signcryption Composability. 321-342 - Laila El Aimani:
On Generic Constructions of Designated Confirmer Signatures. 343-362 - Markus Rückert:
Verifiably Encrypted Signatures from RSA without NIZKs. 363-377 - S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan:
Identity Based Aggregate Signcryption Schemes. 378-397
Multiparty Computation
- Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience. 398-417 - Huafei Zhu, Feng Bao:
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. 418-429 - Gérald Gavin, Marine Minier:
Oblivious Multi-variate Polynomial Evaluation. 430-442
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.