default search action
25th INDOCRYPT 2024: Chennai, India - Part II
- Sourav Mukhopadhyay, Pantelimon Stanica:
Progress in Cryptology - INDOCRYPT 2024 - 25th International Conference on Cryptology in India, Chennai, India, December 18-21, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15496, Springer 2025, ISBN 978-3-031-80310-9
Cryptanalysis
- Trevor Yap, Stjepan Picek, Shivam Bhasin:
OccPoIs: Points of Interest Based on Neural Network's Key Recovery in Side-Channel Analysis Through Occlusion. 3-28 - Nitin Kumar Sharma, Sabyasachi Dey, Santanu Sarkar, Subhamoy Maitra:
On Improved Cryptanalytic Results Against ChaCha for Reduced Rounds $\ge 7$. 29-52 - Amit Jana:
Differential Fault Attack on Ascon Cipher. 53-72 - Debendranath Das, Anirban Ghatak, Indivar Gupta, Sabyasachi Karati, Arindam Mandal:
An Improved Differential Fault Attack on the Stream Cipher Espresso. 73-89 - Emanuele Bellini, Mattia Formenti, David Gérault, Juan Grados, Anna Hambitzer, Yun Ju Huang, Paul Huynh, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari:
CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher. 90-113 - Amrita Bose, Debranjan Pal, Dipanwita Roy Chowdhury:
Deep Learning-Based Differential Distinguishers for Cryptographic Sequences. 114-133 - Shibam Ghosh, Anup Kumar Kundu, Mostafizar Rahman, Dhiman Saha:
BIZness: Bit Invariant Zero-Sum Property Based on Division Trail. 134-155
Post-quantum Cryptography
- David Jao, Jeanne Laflamme:
Isogeny Interpolation and the Computation of Isogenies from Higher Dimensional Representations. 159-179 - Pratima Jana, Ratna Dutta:
CPAKE: An Identity-Binding Password Authenticated Key Exchange from Quasi-cyclic Codes. 180-200 - Santanu Sarkar:
Enhanced Bound for the Commutative Isogeny Hidden Number Problem in CSURF. 201-211 - Aditya Singh Rawat, Mahabir Prasad Jhanwar:
Post-Quantum DNSSEC with Faster TCP Fallbacks. 212-236 - Abhraneel Dutta, Emrah Karagoz, Edoardo Persichetti, Pakize Sanal:
Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography. 237-256 - Ekta Bindal, Abhay Kumar Singh, Manoj Kumar Singh:
A Novel PQ-KEM Based on Coding Theory. 257-278
Blockchain and Cloud Computing
- Rishiraj Bhattacharyya, Avradip Mandal, Meghna Sengupta:
Secure Vault Scheme in the Cloud Operating Model. 281-303 - Debendranath Das, Subhamoy Maitra:
Blockchain-Enabled Distributed Rummy: Proof for the Designers in Online Skill Gaming Industries. 304-326
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.