


default search action
INDOCRYPT 2011: Chennai, India
- Daniel J. Bernstein, Sanjit Chatterjee:

Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings. Lecture Notes in Computer Science 7107, Springer 2011, ISBN 978-3-642-25577-9
Tutorial 1
- Roger Dingledine:

Tor and the Censorship Arms Race: Lessons Learned. 1
Tutorial 2
- Tanja Lange:

Elliptic Curves for Applications. 2
Side-Channel Attacks
- Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:

PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology. 3-21 - Maxime Nassar, Sylvain Guilley, Jean-Luc Danger:

Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks. 22-39 - Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil:

Square Always Exponentiation. 40-57 - Chester Rebeiro

, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay:
An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines. 58-75 - Santanu Sarkar

:
Partial Key Exposure: Generalized Framework to Attack RSA. 76-92
Invited Talk 1
- Christof Paar:

The Yin and Yang Sides of Embedded Security. 93
Secret-Key Cryptography, Part 1
- Michael Gorski, Thomas Knapke, Eik List, Stefan Lucks, Jakob Wenzel:

Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule. 94-113 - Martin Ågren, Thomas Johansson:

Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere. 114-133 - Jean-Philippe Aumasson, María Naya-Plasencia, Markku-Juhani O. Saarinen

:
Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN. 134-145 - Phuong Ha Nguyen, Matthew J. B. Robshaw, Huaxiong Wang:

On Related-Key Attacks and KASUMI: The Case of A5/3. 146-159
Invited Talk 2
- Ross J. Anderson:

Cryptology: Where Is the New Frontier? 160
Secret-Key Cryptography, Part 2
- Jin Hong

, Ga Won Lee, Daegun Ma:
Analysis of the Parallel Distinguished Point Tradeoff. 161-180 - Subhadeep Banik

, Subhamoy Maitra, Santanu Sarkar
:
On the Evolution of GGHN Cipher. 181-195 - Sourav Sen Gupta

, Anupam Chattopadhyay, Ayesha Khalid:
HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers. 196-215 - Mohammad Hassan Habibi, Mohammad Reza Aref, Di Ma

:
Addressing Flaws in RFID Authentication Protocols. 216-235
Hash Functions
- María Naya-Plasencia, Andrea Röck, Willi Meier:

Practical Analysis of Reduced-Round Keccak. 236-254 - Florian Mendel

, Tomislav Nad:
Boomerang Distinguisher for the SIMD-512 Compression Function. 255-269 - Jens-Peter Kaps, Panasayya Yalla, Kishore Kumar Surapathi, Bilal Habib, Susheel Vadlamudi, Smriti Gurung, John Pham:

Lightweight Implementations of SHA-3 Candidates on FPGAs. 270-289
Pairings
- Roy D'Souza, David Jao

, Ilya Mironov
, Omkant Pandey:
Publicly Verifiable Secret Sharing for Cloud-Based Key Management. 290-309 - Robert Drylo:

On Constructing Families of Pairing-Friendly Elliptic Curves with Variable Discriminant. 310-319 - Craig Costello

, Kristin E. Lauter, Michael Naehrig:
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings. 320-342
Invited Talk 3
- Eric Rescorla:

Stone Knives and Bear Skins: Why Does the Internet Run on Pre-historic Cryptography? 343
Protocols
- Hemanta K. Maji, Manoj Prabhakaran:

The Limits of Common Coins: Further Results. 344-358 - Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:

Secure Message Transmission in Asynchronous Directed Graphs. 359-378 - Lakshmi Kuppusamy

, Jothi Rangasamy
, Douglas Stebila
, Colin Boyd, Juanma González Nieto:
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy. 379-398
Tutorial 3
- Shay Gueron

:
Software Optimizations for Cryptographic Primitives on General Purpose x86_64 Platforms. 399-400

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














