


default search action
INDOCRYPT 2015: Bangalore, India
- Alex Biryukov, Vipul Goyal:

Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings. Lecture Notes in Computer Science 9462, Springer 2015, ISBN 978-3-319-26616-9
Public Key Encryption
- Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:

Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps. 3-24 - Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay:

Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing. 25-44 - Kyung-Ah Shim, Cheol-Min Park, Yoo-Jin Baek:

Lite-Rainbow: Lightweight Signature Schemes Based on Multivariate Quadratic Equations and Their Secure Implementations. 45-63 - Haiyang Xue

, Yamin Liu, Xianhui Lu, Bao Li:
Lossy Projective Hashing and Its Applications. 64-84 - Markulf Kohlweiss

, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
:
(De-)Constructing TLS 1.3. 85-102
Cryptanalysis
- Liqiang Peng, Lei Hu, Yao Lu, Santanu Sarkar

, Jun Xu, Zhangjie Huang:
Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents. 105-123 - Subhadeep Banik

:
Some Results on Sprout. 124-139 - Nasour Bagheri

:
Linear Cryptanalysis of Reduced-Round SIMECK Variants. 140-152 - Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi

, Mohammad Reza Aref, Nasour Bagheri
, Praveen Gauravaram
:
Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48. 153-179 - Thierry P. Berger, Marine Minier:

Some Results Using the Matrix Methods on Impossible, Integral and Zero-Correlation Distinguishers for Feistel-Like Ciphers. 180-197 - Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya

:
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256. 198-217 - Huiling Zhang, Wenling Wu:

Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE. 218-237
Side Channel Attacks
- Subhadeep Banik

, Andrey Bogdanov
:
Cryptanalysis of Two Fault Countermeasure Schemes. 241-252 - Nasour Bagheri

, Navid Ghaedi
, Somitra Kumar Sanadhya
:
Differential Fault Analysis of SHA-3. 253-269 - Sylvain Guilley, Annelie Heuser, Olivier Rioul

:
A Key to Success - Success Exponents for Side-Channel Distinguishers. 270-290
Information Theoretic Cryptography
- Yanqing Yao, Zhoujun Li:

Non-malleable Extractors with Shorter Seeds and Their Applications. 293-311 - Maciej Skorski:

Efficiently Simulating High Min-entropy Sources in the Presence of Side Information. 312-325
Lightweight Cryptography
- Ege Gulcan, Aydin Aysu, Patrick Schaumont

:
BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications. 329-346 - Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani

:
Low-Resource and Fast Binary Edwards Curves Cryptography. 347-369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














