


default search action
INDOCRYPT 2016: Kolkata, India
- Orr Dunkelman, Somitra Kumar Sanadhya:

Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Lecture Notes in Computer Science 10095, 2016, ISBN 978-3-319-49889-8
Public-Key Cryptography
- Louis Goubin, Francisco José Vial Prado:

Blending FHE-NTRU Keys - The Excalibur Property. 3-24 - Yamin Liu, Xianhui Lu, Bao Li, Wenpan Jing, Fuyang Fang:

Approximate-Deterministic Public Key Encryption from Hard Learning Problems. 25-42 - Neetu Sharma, Rajeev Anand Sahu

, Vishal Saraswat
, Birendra Kumar Sharma:
Adaptively Secure Strong Designated Signature. 43-60 - Mohamed Saied Emam Mohamed, Albrecht Petzoldt:

The Shortest Signatures Ever. 61-77
Cryptographic Protocols
- Lakshmi Kuppusamy

, Jothi Rangasamy
:
CRT-Based Outsourcing Algorithms for Modular Exponentiations. 81-98 - Muhua Liu, Ying Wu, Rui Xue:

Verifiable Computation for Randomized Algorithm. 99-118 - Lin Zhang, Zhenfeng Zhang:

UC-secure and Contributory Password-Authenticated Group Key Exchange. 119-134
Side-Channel Attacks
- Marios O. Choudary

, Romain Poussier, François-Xavier Standaert
:
Score-Based vs. Probability-Based Enumeration - A Cautionary Note. 137-152 - Peter Pessl:

Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures. 153-170
Implementation of Cryptographic Schemes
- Subhadeep Banik

, Andrey Bogdanov
, Francesco Regazzoni
:
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. 173-190 - Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani

:
Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA. 191-206 - Ekawat Homsirikamol, Kris Gaj:

AEZ: Anything-But EaZy in Hardware. 207-224
Functional Encryption
- Afonso Arriaga

, Manuel Barbosa
, Pooya Farshim:
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation. 227-247 - Hikaru Tsuchida

, Takashi Nishide, Eiji Okamoto, Kwangjo Kim:
Revocable Decentralized Multi-Authority Functional Encryption. 248-265
Symmetric-Key Cryptanalysis
- Tomer Ashur

, Vincent Rijmen
:
On Linear Hulls and Trails. 269-286 - David Gérault, Pascal Lafourcade

:
Related-Key Cryptanalysis of Midori. 287-304 - Sonu Jha, Subhadeep Banik

, Takanori Isobe, Toshihiro Ohigashi
:
Some Proofs of Joint Distributions of Keystream Biases in RC4. 305-321 - Lorenzo Grassi

, Christian Rechberger:
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE. 322-342
Foundations
- Douglas Miller, Adam Scrivener, Jesse Stern, Muthuramakrishnan Venkitasubramaniam:

On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography. 345-363 - Theo Fanuela Prabowo

, Chik How Tan:
Implicit Quadratic Property of Differentially 4-Uniform Permutations. 364-379 - Mahabir Prasad Jhanwar

, Kannan Srinathan:
Secret Sharing for mNP: Completeness Results. 380-390
New Cryptographic Constructions
- Dingding Jia, Xianhui Lu, Bao Li:

Receiver Selective Opening Security from Indistinguishability Obfuscation. 393-410 - Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray:

Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes. 411-428

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














