


default search action
INDOCRYPT 2013: Mumbai, India
- Goutam Paul, Serge Vaudenay:
Progress in Cryptology - INDOCRYPT 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings. Lecture Notes in Computer Science 8250, Springer 2013, ISBN 978-3-319-03514-7
Provable Security
- Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang:
Key-Private Proxy Re-encryption under LWE. 1-18 - Ashish Choudhury
:
Breaking the ${\mathcal{O}}(n|C|)$ Barrier for Unconditionally Secure Asynchronous Multiparty Computation - (Extended Abstract). 19-37 - John O. Pliam:
Alternating Product Ciphers: A Case for Provable Security Comparisons - (Extended Abstract). 38-49
Hash Functions and Signatures
- Marine Minier, Gaël Thomas:
An Integral Distinguisher on Grøstl-512 v3. 50-59 - Christian Hanser, Daniel Slamanig
:
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes. 60-77
Side Channel Attacks I
- Subhadeep Banik
, Anusha Chowdhury:
Improved Scan-Chain Based Attacks and Related Countermeasures. 78-97 - Aurélie Bauer, Éliane Jaulmes:
Correlation Analysis against Protected SFM Implementations of RSA. 98-115
Symmetric Key Cryptanalysis I
- Christophe Clavier, Quentin Isorez, Antoine Wurcker:
Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis. 116-135 - Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya
:
Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN. 136-148 - Céline Blondeau:
Improbable Differential from Impossible Differential: On the Validity of the Model. 149-160
Key Exchange and Secret Sharing
- Kazuki Yoneyama:
Compact Authenticated Key Exchange from Bounded CCA-Secure KEM. 161-178 - Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini:
On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection. 179-196
Side Channel Attacks II
- Benoit Feix, Vincent Verneuil:
There's Something about m-ary - Fixed-Point Scalar Multiplication Protected against Physical Attacks. 197-214 - Fabrizio De Santis, Michael Kasper, Stefan Mangard, Georg Sigl, Oliver Stein, Marc Stöttinger
:
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective. 215-226
Efficient Implementation and Hardware
- Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors. 227-243 - Erich Wenger, Thomas Unterluggauer, Mario Werner:
8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors. 244-261 - Ayantika Chatterjee, Manish Kaushal, Indranil Sengupta:
Accelerating Sorting of Fully Homomorphic Encrypted Data. 262-273
Coding Theory in Cryptography
- Thierry P. Berger:
Construction of Recursive MDS Diffusion Layers from Gabidulin Codes. 274-285 - Vlad Dragoi
, Pierre-Louis Cayrel, Brice Colombier, Tania Richmond:
Polynomial Structures in Code-Based Cryptography. 286-296
Symmetric Key Cryptanalysis II
- Subhadeep Banik
, Santanu Sarkar, Raghu Kacker:
Security Analysis of the RC4+ Stream Cipher. 297-307 - Marine Minier:
On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible Differentials. 308-318

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.