


default search action
INDOCRYPT 2014: New Delhi, India
- Willi Meier, Debdeep Mukhopadhyay:
Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings. Lecture Notes in Computer Science 8885, Springer 2014, ISBN 978-3-319-13038-5
Side Channel Analysis - I
- Benoit Feix, Mylène Roussellet, Alexandre Venelli:
Side-Channel Analysis on Blinded Regular Scalar Multiplications. 3-20 - Lejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall
:
Online Template Attacks. 21-36 - Prakash Dey, Avishek Adhikari:
Improved Multi-Bit Differential Fault Analysis of Trivium. 37-52 - Benoit Feix, Hugues Thiebeauld, Lucille Tordella:
Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel Analysis. 53-67
Theory
- Divya Gupta, Amit Sahai:
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption. 71-88 - Nishanth Chandran, Sanjam Garg:
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions. 89-103
Block Ciphers
- Michael Colburn, Liam Keliher:
Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers. 107-123 - Jialin Huang, Serge Vaudenay, Xuejia Lai:
On the Key Schedule of Lightweight Block Ciphers. 124-142 - Qingju Wang
, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen
, Yosuke Todo
:
Cryptanalysis of Reduced-Round SIMON32 and SIMON48. 143-160 - Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
General Application of FFT in Cryptanalysis and Improved Attack on CAST-256. 161-176
Side Channel Analysis - II
- Subhadeep Banik
, Anupam Chattopadhyay, Anusha Chowdhury:
Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013. 179-196 - Dhiman Saha
, Sukhendu Kuila, Dipanwita Roy Chowdhury:
EscApe: Diagonal Fault Analysis of APE. 197-216
Cryptanalysis
- Inna Polak, Adi Shamir:
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions. 219-236 - Chao Xu, Bin Zhang, Dengguo Feng:
Linear Cryptanalysis of FASER128/256 and TriviA-ck. 237-254 - Santanu Sarkar
, Ayineedi Venkateswarlu:
Partial Key Exposure Attack on CRT-RSA. 255-264 - Elena Pagnin
, Christos Dimitrakakis
, Aysajan Abidin
, Aikaterini Mitrokotsa:
On the Leakage of Information in Biometric Authentication. 265-280
Efficient Hardware Design
- Ayesha Khalid, Prasanna Ravi
, Anupam Chattopadhyay, Goutam Paul:
One Word/Cycle HC-128 Accelerator via State-Splitting Optimization. 283-303 - N. Nalla Anandakumar, Thomas Peyrin
, Axel Poschmann:
A Very Compact FPGA Implementation of LED and PHOTON. 304-321 - Lejla Batina, Domagoj Jakobovic
, Nele Mentens
, Stjepan Picek, Antonio de la Piedra
, Dominik Sisejkovic:
S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go? 322-337
Protected Hardware Design
- Amir Moradi
:
Wire-Tap Codes as Side-Channel Countermeasure - - An FPGA-Based Experiment -. 341-359 - Sumanta Sarkar, Subhamoy Maitra, Kaushik Chakraborty:
Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes. 360-373 - Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic
:
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. 374-390
Elliptic Curves
- Kwang Ho Kim, Chol Ok Lee, Christophe Nègre:
Binary Edwards Curves Revisited. 393-408 - Steven D. Galbraith
, Shishay W. Gebregiyorgis:
Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two. 409-427 - Jean-François Biasse
, David Jao
, Anirudh Sankar:
A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves. 428-442

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.