


default search action
INDOCRYPT 2010: Hyderabad, India
- Guang Gong, Kishan Chand Gupta:

Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings. Lecture Notes in Computer Science 6498, Springer 2010, ISBN 978-3-642-17400-1
Invitd Talk
- Neal Koblitz:

Getting a Few Things Right and Many Things Wrong. 1
Security of RSA and Multivariate Schemes
- Santanu Sarkar

, Sourav Sen Gupta
, Subhamoy Maitra:
Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions. 2-16 - Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann:

Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks. 17-32 - Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann:

CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key. 33-48
Security Analysis, Pseudorandom Permutations and Applications
- Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu

:
Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols. 49-68 - Avradip Mandal, Jacques Patarin, Valérie Nachef:

Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations. 69-81 - Mridul Nandi

:
The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants. 82-97 - Zhe Xia, Chris Culnane

, James Heather, Hugo Jonker, Peter Y. A. Ryan
, Steve A. Schneider
, Sriramkrishnan Srinivasan:
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. 98-114
Invited Talk
- Bart Preneel

:
Cryptographic Hash Functions: Theory and Practice. 115-117
Hash Functions
- Ashish Kumar, Somitra Kumar Sanadhya

, Praveen Gauravaram
, Masoumeh Safkhani
, Majid Naderi:
Cryptanalysis of Tav-128 Hash Function. 118-130 - Meltem Sönmez Turan, Erdener Uyan:

Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing. 131-143 - Mridul Nandi

, Souradyuti Paul:
Speeding Up the Wide-Pipe: Secure and Fast Hashing. 144-162
Attacks on Block Ciphers and Stream Ciphers
- Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks:

New Boomerang Attacks on ARIA. 163-175 - Gregory V. Bard, Nicolas T. Courtois, Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang:

Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers. 176-196 - Cihangir Tezcan

:
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA. 197-209 - Paul Stankovski

:
Greedy Distinguishers and Nonrandomness Detectors. 210-226
Fast Cryptographic Computation
- Sedat Akleylek

, Murat Cenk
, Ferruh Özbudak
:
Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity. 227-237 - Fabien Herbaut, Pierre-Yvan Liardet, Nicolas Méloni, Yannick Teglia, Pascal Véron

:
Random Euclidean Addition Chain Generation and Its Application to Point Multiplication. 238-261
Cryptanalysis of AES
- Emmanuel Prouff, Thomas Roche:

Attack on a Higher-Order Masking of the AES Based on Homographic Functions. 262-281 - Hamid Mala, Mohammad Dakhilalian

, Vincent Rijmen
, Mahmoud Modarres-Hashemi:
Improved Impossible Differential Cryptanalysis of 7-Round AES-128. 282-291 - Yoni De Mulder, Brecht Wyseur, Bart Preneel

:
Cryptanalysis of a Perturbated White-Box AES Implementation. 292-310
Efficient Implementation
- Raymond Manley, David Gregg:

A Program Generator for Intel AES-NI Instructions. 311-327 - Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:

ECC2K-130 on NVIDIA GPUs. 328-346 - Sourav Sen Gupta

, Koushik Sinha
, Subhamoy Maitra, Bhabani P. Sinha:
One Byte per Clock: A Novel RC4 Hardware. 347-363

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














