


default search action
24th INDOCRYPT 2023: Goa, India - Part I
- Anupam Chattopadhyay
, Shivam Bhasin
, Stjepan Picek
, Chester Rebeiro
:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14459, Springer 2024, ISBN 978-3-031-56231-0
Symmetric-Key Cryptography, Hash Functions, Authenticated Encryption Modes
- Koustabh Ghosh
, Parisa Amiri-Eliasi
, Joan Daemen
:
Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and Cyclic Shift. 3-24 - Nilanjan Datta, Avijit Dutta, Eik List, Sougata Mandal:
On the Security of Triplex- and Multiplex-Type Constructions with Smaller Tweaks. 25-47 - Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:
From Substitution Box to Threshold. 48-67 - Nilanjan Datta, Avijit Dutta, Samir Kundu
:
Tight Security Bound of $\textsf {2k{\text {-}}LightMAC\_Plus}$. 68-88 - Bishwajit Chakraborty, Nilanjan Datta, Mridul Nandi:
Designing Full-Rate Sponge Based AEAD Modes. 89-110 - Yuqing Zhao, Chun Guo:
Towards Minimizing Tweakable Blockcipher-Based Generalized Feistel Networks. 111-133 - Clément Hoffmann
, Pierrick Méaux
, François-Xavier Standaert
:
The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm. 134-156
Elliptic Curves, Zero-Knowledge Proof, Signatures
- Youcef Mokrani, David Jao
:
Generating Supersingular Elliptic Curves over $\mathbb {F}_p$ with Unknown Endomorphism Ring. 159-174 - Sabyasachi Karati, Gourab Chandra Saha:
Kummer and Hessian Meet in the Field of Characteristic 2. 175-196 - R. Kabaleeshwaran
, Panuganti Venkata Shanmukh Sai:
Synchronized Aggregate Signature Under Standard Assumption in the Random Oracle Model. 197-220 - Mingjie Chen, Yi-Fu Lai, Abel Laval, Laurane Marco, Christophe Petit
:
Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits Based on Isogenies. 221-243
Attacks
- François Delobel, Patrick Derbez, Arthur Gontier, Loïc Rouquette, Christine Solnon:
A CP-Based Automatic Tool for Instantiating Truncated Differential Characteristics. 247-268 - Gregor Leander, Lukas Stennes, Jan Vorloeper:
Falling into Bytes and Pieces - Cryptanalysis of an Apple Patent Application. 269-286 - Arpita Maitra, Asmita Samanta, Subha Kar, Hirendra Kumar Garai, Mintu Mandal, Sabyasachi Dey:
Grover on Chosen IV Related Key Attack Against GRAIN-128a. 287-306 - Sreyosi Bhattacharyya, Palash Sarkar:
Concrete Time/Memory Trade-Offs in Generalised Stern's ISD Algorithm. 307-328 - Lukas Vlasak
, Antoine Bouvet
, Sylvain Guilley
:
Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2. 329-349

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.