


default search action
INDOCRYPT 2006: Kolkata, India
- Rana Barua, Tanja Lange:

Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings. Lecture Notes in Computer Science 4329, Springer 2006, ISBN 3-540-49767-6
Invited Talk
- James L. Massey:

Whither Cryptography? 1
Symmetric Cryptography: Attacks
- Simon Fischer, Willi Meier, Côme Berbain, Jean-François Biasse

, Matthew J. B. Robshaw:
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. 2-16 - Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman:

Differential and Rectangle Attacks on Reduced-Round SHACAL-1. 17-31 - Kenneth Koon-Ho Wong

, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai:
Algebraic Attacks on Clock-Controlled Cascade Ciphers. 32-47 - Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura

:
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. 48-62
Hash Functions
- Florian Mendel

, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe:
Update on Tiger. 63-79 - Donghoon Chang, Kishan Chand Gupta, Mridul Nandi:

RC4-Hash: A New Hash Function Based on RC4. 80-94 - Markku-Juhani Olavi Saarinen

:
Security of VSH in the Real World. 95-103
Provable Security: Key Agreement
- Raphael C.-W. Phan, Bok-Min Goi:

Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. 104-117 - Weijia Wang, Lei Hu:

Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. 118-132 - Alfred Menezes, Berkant Ustaoglu

:
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols. 133-147
Invited Talk
- Neal Koblitz, Alfred Menezes:

Another Look at "Provable Security". II. 148-175
Provable Security: Public Key Cryptography
- Jaimee Brown, Juan Manuel González Nieto, Colin Boyd:

Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. 176-190 - Isamu Teranishi, Takuro Oyama, Wakaha Ogata

:
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. 191-205 - Ian F. Blake, Aldar C.-F. Chan:

Conditionally Verifiable Signature. 206-220 - Arpita Patra, Ashish Choudhary

, K. Srinathan, C. Pandu Rangan:
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission. 221-235
Symmetric Cryptography: Design
- Frédéric Didier:

Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks. 236-250 - Valery Pryamikov:

Enciphering with Arbitrary Small Finite Domains. 251-265 - Selçuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yücel:

Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240. 266-279
Modes of Operation and Message Authentication Codes
- Peng Wang

, Dengguo Feng, Wenling Wu:
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. 280-286 - Debrup Chakraborty, Palash Sarkar:

HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach. 287-302 - Ryo Nojima, Kazukuni Kobara, Hideki Imai:

Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. 303-316 - Mridul Nandi:

A Simple and Unified Method of Proving Indistinguishability. 317-334
Fast Implementation of Public Key Cryptography
- Christophe Doche, Laurent Imbert:

Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. 335-348 - Johannes Buchmann, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich:

CMSS - An Improved Merkle Signature Scheme. 349-363
ID-Based Cryptography
- Man Ho Au, Joseph K. Liu, Willy Susilo

, Tsz Hon Yuen:
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. 364-378 - Manuel Barbosa

, Pooya Farshim:
Secure Cryptographic Workflow in the Standard Model. 379-393 - Sanjit Chatterjee, Palash Sarkar:

Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. 394-408 - Jian Weng

, Shengli Liu, Kefei Chen, Changshe Ma:
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. 409-423
Embedded System and Side Channel Attacks
- Matthew Darnall, Doug Kuhlman:

AES Software Implementations on ARM7TDMI. 424-435 - Antoine Joux, Pascal Delaunay:

Galois LFSR, Embedded Devices and Side Channel Weaknesses. 436-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














