skip to content
Progress in cryptology-- INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings Preview this item
ClosePreview this item

Progress in cryptology-- INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings

Author: Steven D Galbraith; Mridul Nandi
Publisher: Berlin ; New York : Springer, ©2012.
Series: Lecture notes in computer science, 7668.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography,  Read more...
Getting this item's online copy... Getting this item's online copy...

Find a copy in the library

Getting this item's location and availability... Getting this item's location and availability...

WorldCat

Find it in libraries globally
Worldwide libraries own this item

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Progress in cryptology
(NL-LeOCL)353763470
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Steven D Galbraith; Mridul Nandi
ISBN: 9783642349317 3642349315 3642349307 9783642349300
OCLC Number: 822995929
Description: 1 online resource (xiii, 566 pages) : illustrations.
Contents: Invited Papers --
How to Compute on Encrypted Data / Vinod Vaikuntanathan --
From Multiple Encryption to Knapsacks --
Efficient Dissection of Composite Problems / Orr Dunkelman --
Using the Cloud to Determine Key Strengths / Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart --
Protocol --
A Unified Characterization of Completeness and Triviality for Secure Function Evaluation / Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek --
On the Non-malleability of the Fiat-Shamir Transform / Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi --
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 / Arpita Maitra, Goutam Paul --
On-Line/Off-Line Leakage Resilient Secure Computation Protocols / Chaya Ganesh, Vipul Goyal, Satya Lokam --
Side Channel --
Leakage Squeezing of Order Two / Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi. ROSETTA for Single Trace Analysis / Christophe Clavier, Benoit Feix, Georges Gagnerot, Christophe Giraud, Mylène Roussellet --
Hash Functions and Stream Cipher --
Collision Attack on the Hamsi-256 Compression Function / Mario Lamberger, Florian Mendel, Vincent Rijmen --
Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks / Tuomas Kortelainen, Ari Vesanen, Juha Kortelainen --
A Differential Fault Attack on the Grain Family under Reasonable Assumptions / Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar --
Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs / Thierry P. Berger, Marine Minier --
Cryptanalysis of Block Ciphers --
Faster Chosen-Key Distinguishers on Reduced-Round AES / Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean --
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher / Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic. Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds / Yu Sasaki --
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers / Shengbao Wu, Mingsheng Wang --
Time Memory Trade-Off --
High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System / Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, Sung-Ryul Kim --
Computing Small Discrete Logarithms Faster / Daniel J. Bernstein, Tanja Lange --
Hardware --
Embedded Syndrome-Based Hashing / Ingo von Maurich, Tim Güneysu --
Hardware --
Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA / Thomas Plos, Christoph Dobraunig, Markus Hofinger, Alexander Oprisnik --
Elliptic Curve --
Efficient Arithmetic on Elliptic Curves in Characteristic 2 / David Kohel --
A New Model of Binary Elliptic Curves / Hongfeng Wu, Chunming Tang, Rongquan Feng. Analysis of Optimum Pairing Products at High Security Levels / Xusheng Zhang, Dongdai Lin --
Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian / Robert Dryło --
Digital Signature --
Faster Batch Forgery Identification / Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk --
Implementing CFS / Gregory Landais, Nicolas Sendrier --
Symmetric Key Design and Provable Security --
SipHash: A Fast Short-Input PRF / Jean-Philippe Aumasson, Daniel J. Bernstein --
A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA / Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj --
Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers / Aslı Bay, Atefeh Mashatan, Serge Vaudenay --
Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme / Donghoon Chang.
Series Title: Lecture notes in computer science, 7668.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: INDOCRYPT 2012
Responsibility: Steven Galbraith, Mridul Nandi (eds.).

Abstract:

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.
Retrieving notes about this item Retrieving notes about this item

Reviews

User-contributed reviews

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.