


default search action
INDOCRYPT 2005: Bangalore, India
- Subhamoy Maitra, C. E. Veni Madhavan, Ramarathnam Venkatesan:

Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings. Lecture Notes in Computer Science 3797, Springer 2005, ISBN 3-540-30805-9
Invited Talk
- V. Kumar Murty:

Abelian Varieties and Cryptography. 1-12
Sequences
- Harald Niederreiter, Li-Ping Wang:

Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences. 13-22 - Jin Hong

:
Period of Streamcipher Edon80. 23-34
Boolean Function and S-Box
- An Braeken

, Bart Preneel:
On the Algebraic Immunity of Symmetric Boolean Functions. 35-48 - Claude Carlet:

On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks. 49-62
Hash Functions
- Deukjo Hong, Jaechul Sung

, Seokhie Hong, Sangjin Lee:
How to Construct Universal One-Way Hash Functions of Order r. 63-76 - Mridul Nandi

:
Towards Optimal Double-Length Hash Functions. 77-89
Design Principles
- Souradyuti Paul, Bart Preneel:

Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries. 90-103 - Frederik Armknecht, Matthias Krause, Dirk Stegemann:

Design Principles for Combiners with Memory. 104-117
Cryptanalysis I
- Domingo Gómez

, Jaime Gutierrez
, Álvar Ibeas:
Cryptanalysis of the Quadratic Generator. 118-129 - Håkan Englund, Alexander Maximov:

Attack the Dragon. 130-142 - Thierry P. Berger, Marine Minier:

Two Algebraic Attacks Against the F-FCSRs Using the IV Mode. 143-154 - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:

Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. 155-168
Time Memory Trade-Off
- Jin Hong

, Woo-Hwan Kim:
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY. 169-182 - Gildas Avoine, Pascal Junod

, Philippe Oechslin:
Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. 183-196
Cryptanalysis II
- Tanmoy Kanti Das, Jianying Zhou:

Cryptanalysis of Barni et al. Watermarking Scheme. 197-208 - Heiko Stamer:

Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. 209-220
New Constructions
- Sarang Aravamuthan, Sachin Lodha:

An Optimal Subset Cover for Broadcast Encryption. 221-231 - Michael Coglianese, Bok-Min Goi

:
MaTRU: A New NTRU-Based Cryptosystem. 232-243 - Duong Viet, Akihiro Yamamura

, Hidema Tanaka:
Anonymous Password-Based Authenticated Key Exchange. 244-257
Pairings
- Michael Scott:

Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism. 258-269 - Mototsugu Nishioka:

Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme. 270-282
Signatures
- Fabien Laguillaumie, Damien Vergnaud

:
Short Undeniable Signatures Without Random Oracles: The Missing Link. 283-296 - Hong Wang, Yuqing Zhang, Dengguo Feng:

Short Threshold Signature Schemes Without Random Oracles. 297-310
Applications
- Jose Antonio Onieva

, Jianying Zhou, Javier López
:
Attacking an Asynchronous Multi-party Contract Signing Protocol. 311-321 - Jens-Matthias Bohli, Jörn Müller-Quade, Stefan Röhrich:

Fairness and Correctness in Case of a Premature Abort. 322-331
E-Cash
- Man Ho Au

, Sherman S. M. Chow
, Willy Susilo
:
Short E-Cash. 332-346 - Mårten Trolin:

A Universally Composable Scheme for Electronic Cash. 347-360
Implementations
- Akhilesh Tyagi:

Energy-Privacy Trade-Offs in VLSI Computations. 361-374 - Chang Han Kim, Yongtae Kim, Nam Su Chang, IlHwan Park:

Modified Serial Multipliers for Type-IV Gaussian Normal Bases. 375-388 - Christophe Nègre:

Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic. 389-402 - Tanja Lange, Pradeep Kumar Mishra:

SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. 403-416

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














