


default search action
INDOCRYPT 2009: New Delhi, India
- Bimal K. Roy, Nicolas Sendrier:

Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings. Lecture Notes in Computer Science 5922, Springer 2009, ISBN 978-3-642-10627-9
Post-Quantum Cryptology
- Johannes Buchmann, Richard Lindner:

Secure Parameters for SWIFFT. 1-17 - Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe:

FSBday. 18-38
Key Agreement Protocols
- Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu

:
Reusing Static Keys in Key Agreement Protocols. 39-56 - Colleen Swanson, David Jao

:
A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols. 57-71
Side Channel Attacks
- Alexandre Berzati, Cécile Canovas-Dumas

, Louis Goubin:
Fault Analysis of Rabbit: Toward a Secret Key Leakage. 72-87 - Julien Bringer, Hervé Chabanne, Thomas Icart:

On Physical Obfuscation of Cryptographic Algorithms. 88-103 - Chester Rebeiro

, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga:
Cache Timing Attacks on Clefia. 104-118
Symmetric Cryptology
- Thierry P. Berger, Marine Minier, Benjamin Pousse:

Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode. 119-135 - Sumanta Sarkar:

On the Symmetric Negabent Boolean Functions. 136-143 - Hüseyin Demirci

, Ihsan Taskin, Mustafa Çoban, Adnan Baysal
:
Improved Meet-in-the-Middle Attacks on AES. 144-156
Hash Functions
- Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks:

Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. 157-168 - Kota Ideguchi, Dai Watanabe:

Second Preimage Attack on SHAMATA-512. 169-181 - Zheng Gong, Pieter H. Hartel

, Svetla Nikova, Bo Zhu:
Towards Secure and Practical MACs for Body Sensor Networks. 182-198 - Rishiraj Bhattacharyya

, Avradip Mandal, Mridul Nandi
:
Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions. 199-218 - Florian Mendel

, Tomislav Nad:
A Distinguisher for the Compression Function of SIMD-512. 219-232
Number Theoretic Cryptology
- Mahabir Prasad Jhanwar

, Rana Barua:
Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree. 233-247 - Conrado Porto Lopes Gouvêa, Julio López:

Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller. 248-262 - Dong Su, Kewei Lv:

A New Hard-Core Predicate of Paillier's Trapdoor Function. 263-271
Lightweight Cryptology
- Julien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji:

Private Interrogation of Devices via Identification Codes. 272-289 - Gildas Avoine, Christian Floerkemeier, Benjamin Martin:

RFID Distance Bounding Multistate Enhancement. 290-307 - Olivier Billet, Kaoutar Elkhiyaoui:

Two Attacks against the Ff RFID Protocol. 308-320
Signature Protocols
- Takahiro Matsuda, Kanta Matsuura

, Jacob C. N. Schuldt:
Efficient Constructions of Signcryption Schemes and Signcryption Composability. 321-342 - Laila El Aimani

:
On Generic Constructions of Designated Confirmer Signatures. 343-362 - Markus Rückert:

Verifiably Encrypted Signatures from RSA without NIZKs. 363-377 - S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan:

Identity Based Aggregate Signcryption Schemes. 378-397
Multiparty Computation
- Arpita Patra, Ashish Choudhary

, C. Pandu Rangan:
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience. 398-417 - Huafei Zhu, Feng Bao:

Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. 418-429 - Gérald Gavin, Marine Minier:

Oblivious Multi-variate Polynomial Evaluation. 430-442

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














