skip to content
Progress in cryptology-- INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings Preview this item
ClosePreview this item
Checking...

Progress in cryptology-- INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings

Author: Steven D Galbraith; Mridul Nandi
Publisher: Berlin ; New York : Springer, ©2012.
Series: Lecture notes in computer science, 7668.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference proceedings
Congresses
Additional Physical Format: Progress in cryptology
(NL-LeOCL)353763470
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Steven D Galbraith; Mridul Nandi
ISBN: 9783642349317 3642349315 3642349307 9783642349300
OCLC Number: 822995929
Notes: International conference proceedings.
Description: 1 online resource (xiii, 566 p.) : ill.
Contents: Invited Papers --
How to Compute on Encrypted Data / Vinod Vaikuntanathan --
From Multiple Encryption to Knapsacks - Efficient Dissection of Composite Problems / Orr Dunkelman --
Using the Cloud to Determine Key Strengths / Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart --
Protocol --
A Unified Characterization of Completeness and Triviality for Secure Function Evaluation / Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek --
On the Non-malleability of the Fiat-Shamir Transform / Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi --
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 / Arpita Maitra, Goutam Paul --
On-Line/Off-Line Leakage Resilient Secure Computation Protocols / Chaya Ganesh, Vipul Goyal, Satya Lokam --
Side Channel --
Leakage Squeezing of Order Two / Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi --
ROSETTA for Single Trace Analysis / Christophe Clavier, Benoit Feix, Georges Gagnerot, Christophe Giraud, Mylène Roussellet --
Hash Functions and Stream Cipher --
Collision Attack on the Hamsi-256 Compression Function / Mario Lamberger, Florian Mendel, Vincent Rijmen --
Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks / Tuomas Kortelainen, Ari Vesanen, Juha Kortelainen --
A Differential Fault Attack on the Grain Family under Reasonable Assumptions / Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar --
Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs / Thierry P. Berger, Marine Minier --
Cryptanalysis of Block Ciphers --
Faster Chosen-Key Distinguishers on Reduced-Round AES / Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean --
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher / Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic --
Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds / Yu Sasaki --
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers / Shengbao Wu, Mingsheng Wang --
Time Memory Trade-Off --
High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System / Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, Sung-Ryul Kim --
Computing Small Discrete Logarithms Faster / Daniel J. Bernstein, Tanja Lange --
Hardware --
Embedded Syndrome-Based Hashing / Ingo von Maurich, Tim Güneysu --
Hardware --
Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA / Thomas Plos, Christoph Dobraunig, Markus Hofinger, Alexander Oprisnik --
Elliptic Curve --
Efficient Arithmetic on Elliptic Curves in Characteristic 2 / David Kohel --
A New Model of Binary Elliptic Curves / Hongfeng Wu, Chunming Tang, Rongquan Feng --
Analysis of Optimum Pairing Products at High Security Levels / Xusheng Zhang, Dongdai Lin --
Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian / Robert Dryło --
Digital Signature --
Faster Batch Forgery Identification / Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk --
Implementing CFS / Gregory Landais, Nicolas Sendrier --
Symmetric Key Design and Provable Security --
SipHash: A Fast Short-Input PRF / Jean-Philippe Aumasson, Daniel J. Bernstein --
A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA / Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj --
Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers / Aslı Bay, Atefeh Mashatan, Serge Vaudenay --
Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme / Donghoon Chang.
Series Title: Lecture notes in computer science, 7668.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: INDOCRYPT 2012
Responsibility: Steven Galbraith, Mridul Nandi (eds.).
More information:

Abstract:

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/822995929>
library:oclcnum"822995929"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
rdf:typeschema:Book
rdf:typeschema:MediaObject
rdf:valueUnknown value: cnp
rdf:valueUnknown value: dct
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:alternateName"INDOCRYPT 2012"@en
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:copyrightYear"2012"
schema:creator
schema:datePublished"2012"
schema:description"This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1207077317>
schema:genre"Electronic books"@en
schema:genre"Conference proceedings"@en
schema:inLanguage"en"
schema:isPartOf
schema:isPartOf
schema:name"Progress in cryptology-- INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings"@en
schema:numberOfPages"566"
schema:publication
schema:publisher
schema:url
schema:workExample
schema:workExample
schema:workExample
wdrs:describedby

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.