


default search action
22nd INDOCRYPT 2021: India, Jaipur, India
- Avishek Adhikari

, Ralf Küsters
, Bart Preneel
:
Progress in Cryptology - INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings. Lecture Notes in Computer Science 13143, Springer 2021, ISBN 978-3-030-92517-8
Authenticated Encryption
- Shay Gueron, Ashwin Jha, Mridul Nandi:

Revisiting the Security of COMET Authenticated Encryption Scheme. 3-25 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi:

tHyENA: Making HyENA Even Smaller. 26-48 - K. V. L. Bhargavi

, Chungath Srinivasan
, K. V. Lakshmy
:
Panther: A Sponge Based Lightweight Authenticated Encryption Scheme. 49-70
Symmetric Cryptography
- Rishiraj Bhattacharyya

, Mridul Nandi, Anik Raychaudhuri:
Crooked Indifferentiability of Enveloped XOR Revisited. 73-92 - Qi Da, Shanjie Xu, Chun Guo:

Sequential Indifferentiability of Confusion-Diffusion Networks. 93-113 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:

Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. 114-137
Lightweight Cryptography
- Anubhab Baksi, Vishnu Asutosh Dasu

, Banashri Karmakar
, Anupam Chattopadhyay, Takanori Isobe:
Three Input Exclusive-OR Gate Support for Boyar-Peralta's Algorithm. 141-158 - Zhenyu Lu, Weijia Wang

, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang:
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes. 159-178 - Ravi Anand, Arpita Maitra, Subhamoy Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay

:
Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover's Attacks. 179-198
Side-Channel Attacks
- Siemen Dhooghe

:
Analyzing Masked Ciphers Against Transition and Coupling Effects. 201-223 - Abubakr Abdulgadir, Kamyar Mohajerani, Viet Ba Dang, Jens-Peter Kaps

, Kris Gaj:
A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks. 224-245 - Andrea Caforio, Daniel Collins, Ognjen Glamocanin, Subhadeep Banik

:
Improving First-Order Threshold Implementations of SKINNY. 246-267
Fault Attacks
- Bhagwan N. Bathe, Siddhartha Tiwari, Ravi Anand

, Dibyendu Roy, Subhamoy Maitra:
Differential Fault Attack on Espresso. 271-286 - Andy Russon:

Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization. 287-310 - Julius Hermelink, Peter Pessl, Thomas Pöppelmann:

Fault-Enabled Chosen-Ciphertext Attacks on Kyber. 311-334
Post-Quantum Cryptography
- Robi Pedersen

:
DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting. 337-361 - Surbhi Shaw

, Ratna Dutta:
Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures. 362-386 - Sanjit Chatterjee, Akansha Dimri, Tapas Pandit:

Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting. 387-412
Public Key Encryption and Protocols
- Danilo Francati

, Alessio Guidi, Luigi Russo
, Daniele Venturi
:
Identity-Based Matchmaking Encryption Without Random Oracles. 415-435 - Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide:

Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain. 436-461 - Deepak Kumaraswamy, Srinivas Vivek

:
Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE. 462-484
Cryptographic Constructions
- Najwa Aaraj, Chiara Marcolla

, Xiaojie Zhu:
Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy. 487-509 - Behzad Abdolmaleki, Hamidreza Khoshakhlagh

, Helger Lipmaa:
Smooth Zero-Knowledge Hash Functions. 510-535 - Kodai Toyoda

, Daiki Miyahara
, Takaaki Mizuki
:
Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation. 536-555
Blockchains
- Mic Bowman, Debajyoti Das

, Avradip Mandal, Hart Montgomery:
On Elapsed Time Consensus Protocols. 559-583 - Samuel Jaques, Hart Montgomery, Razvan Rosie, Arnab Roy:

Time-Release Cryptography from Minimal Circuit Assumptions. 584-606 - Matteo Campanelli

, Hamidreza Khoshakhlagh
:
Succinct Publicly-Certifiable Proofs - Or, Can a Blockchain Verify a Designated-Verifier Proof? 607-631

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














