default search action
INDOCRYPT 2015: Bangalore, India
- Alex Biryukov, Vipul Goyal:
Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings. Lecture Notes in Computer Science 9462, Springer 2015, ISBN 978-3-319-26616-9
Public Key Encryption
- Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps. 3-24 - Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay:
Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing. 25-44 - Kyung-Ah Shim, Cheol-Min Park, Yoo-Jin Baek:
Lite-Rainbow: Lightweight Signature Schemes Based on Multivariate Quadratic Equations and Their Secure Implementations. 45-63 - Haiyang Xue, Yamin Liu, Xianhui Lu, Bao Li:
Lossy Projective Hashing and Its Applications. 64-84 - Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
(De-)Constructing TLS 1.3. 85-102
Cryptanalysis
- Liqiang Peng, Lei Hu, Yao Lu, Santanu Sarkar, Jun Xu, Zhangjie Huang:
Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents. 105-123 - Subhadeep Banik:
Some Results on Sprout. 124-139 - Nasour Bagheri:
Linear Cryptanalysis of Reduced-Round SIMECK Variants. 140-152 - Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram:
Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48. 153-179 - Thierry P. Berger, Marine Minier:
Some Results Using the Matrix Methods on Impossible, Integral and Zero-Correlation Distinguishers for Feistel-Like Ciphers. 180-197 - Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya:
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256. 198-217 - Huiling Zhang, Wenling Wu:
Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE. 218-237
Side Channel Attacks
- Subhadeep Banik, Andrey Bogdanov:
Cryptanalysis of Two Fault Countermeasure Schemes. 241-252 - Nasour Bagheri, Navid Ghaedi, Somitra Kumar Sanadhya:
Differential Fault Analysis of SHA-3. 253-269 - Sylvain Guilley, Annelie Heuser, Olivier Rioul:
A Key to Success - Success Exponents for Side-Channel Distinguishers. 270-290
Information Theoretic Cryptography
- Yanqing Yao, Zhoujun Li:
Non-malleable Extractors with Shorter Seeds and Their Applications. 293-311 - Maciej Skorski:
Efficiently Simulating High Min-entropy Sources in the Presence of Side Information. 312-325
Lightweight Cryptography
- Ege Gulcan, Aydin Aysu, Patrick Schaumont:
BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications. 329-346 - Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Low-Resource and Fast Binary Edwards Curves Cryptography. 347-369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.