


default search action
24th INDOCRYPT 2023: Goa, India - Part I
- Anupam Chattopadhyay

, Shivam Bhasin
, Stjepan Picek
, Chester Rebeiro
:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14459, Springer 2024, ISBN 978-3-031-56231-0
Symmetric-Key Cryptography, Hash Functions, Authenticated Encryption Modes
- Koustabh Ghosh

, Parisa Amiri-Eliasi
, Joan Daemen
:
Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and Cyclic Shift. 3-24 - Nilanjan Datta, Avijit Dutta, Eik List, Sougata Mandal:

On the Security of Triplex- and Multiplex-Type Constructions with Smaller Tweaks. 25-47 - Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:

From Substitution Box to Threshold. 48-67 - Nilanjan Datta, Avijit Dutta, Samir Kundu

:
Tight Security Bound of $\textsf {2k{\text {-}}LightMAC\_Plus}$. 68-88 - Bishwajit Chakraborty, Nilanjan Datta, Mridul Nandi:

Designing Full-Rate Sponge Based AEAD Modes. 89-110 - Yuqing Zhao, Chun Guo:

Towards Minimizing Tweakable Blockcipher-Based Generalized Feistel Networks. 111-133 - Clément Hoffmann

, Pierrick Méaux
, François-Xavier Standaert
:
The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm. 134-156
Elliptic Curves, Zero-Knowledge Proof, Signatures
- Youcef Mokrani, David Jao

:
Generating Supersingular Elliptic Curves over $\mathbb {F}_p$ with Unknown Endomorphism Ring. 159-174 - Sabyasachi Karati, Gourab Chandra Saha:

Kummer and Hessian Meet in the Field of Characteristic 2. 175-196 - R. Kabaleeshwaran

, Panuganti Venkata Shanmukh Sai:
Synchronized Aggregate Signature Under Standard Assumption in the Random Oracle Model. 197-220 - Mingjie Chen, Yi-Fu Lai, Abel Laval

, Laurane Marco
, Christophe Petit
:
Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits Based on Isogenies. 221-243
Attacks
- François Delobel, Patrick Derbez, Arthur Gontier, Loïc Rouquette, Christine Solnon:

A CP-Based Automatic Tool for Instantiating Truncated Differential Characteristics. 247-268 - Gregor Leander

, Lukas Stennes, Jan Vorloeper:
Falling into Bytes and Pieces - Cryptanalysis of an Apple Patent Application. 269-286 - Arpita Maitra, Asmita Samanta, Subha Kar, Hirendra Kumar Garai, Mintu Mandal

, Sabyasachi Dey:
Grover on Chosen IV Related Key Attack Against GRAIN-128a. 287-306 - Sreyosi Bhattacharyya, Palash Sarkar:

Concrete Time/Memory Trade-Offs in Generalised Stern's ISD Algorithm. 307-328 - Lukas Vlasak

, Antoine Bouvet
, Sylvain Guilley
:
Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2. 329-349

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














