default search action
20th INDOCRYPT 2019: Hyderabad, India
- Feng Hao, Sushmita Ruj, Sourav Sen Gupta:
Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings. Lecture Notes in Computer Science 11898, Springer 2019, ISBN 978-3-030-35422-0
Constructions: Signatures and Filter Permutators
- Ward Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:
PKP-Based Signature Scheme. 3-22 - Thaís Bardini Idalino, Lucia Moura, Carlisle Adams:
Modification Tolerant Signature Schemes: Location and Correction. 23-44 - Sanjit Chatterjee, R. Kabaleeshwaran:
Rerandomizable Signatures Under Standard Assumption. 45-67 - Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert:
Improved Filter Permutators for Efficient FHE: Better Instances and Implementations. 68-91
Cryptanalysis: Symmetric Key Ciphers and Hash Functions
- Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra:
RC4: Non-randomness in the Index j and Some Results on Its Cycles. 95-114 - Mingjiang Huang, Liming Wang:
Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications. 115-138 - Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128. 139-159 - Abhishek Kesarwani, Santanu Sarkar, Ayineedi Venkateswarlu:
Some Cryptanalytic Results on TRIAD. 160-174 - Mahesh Sreekumar Rajasree:
Cryptanalysis of Round-Reduced KECCAK Using Non-linear Structures. 175-192
Protocols: Blockchain, Secure Computation and Blind Coupon Mechanism
- Arijit Dutta, Arnab Jana, Saravanan Vijayakumaran:
Nummatus: A Privacy Preserving Proof of Reserves Protocol for Quisquis. 195-215 - Sibi Raj B. Pillai, Manoj Prabhakaran, Vinod M. Prabhakaran, Srivatsan Sridhar:
Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure Computation. 216-226 - Dragos Rotaru, Tim Wood:
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security. 227-249 - Colin Boyd, Kristian Gjøsteen, Clémentine Gritti, Thomas Haines:
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. 250-270
Theory: Oblivious Transfer, Obfuscation and Privacy Amplification
- Aditya Damodaran, Maria Dubovitskaya, Alfredo Rial:
UC Priced Oblivious Transfer with Purchase Statistics and Dynamic Pricing. 273-296 - Dongxue Pan, Bei Liang, Hongda Li, Peifang Ni:
Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications. 297-317 - Eshan Chattopadhyay, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Privacy Amplification from Non-malleable Codes. 318-337
Mathematics: Boolean Functions, Elliptic Curves and Lattices
- Deng Tang, Bimal Mandal, Subhamoy Maitra:
Vectorial Boolean Functions with Very Low Differential-Linear Uniformity Using Maiorana-McFarland Type Construction. 341-360 - Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha:
On the Relationship Between Resilient Boolean Functions and Linear Branch Number of S-Boxes. 361-374 - Peter Schwabe, Amber Sprenkels:
The Complete Cost of Cofactor h=1. 375-397 - Jun Xu, Santanu Sarkar, Lei Hu:
Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction. 398-411
Quantum: Algorithms, Attacks and Key Distribution
- Debajyoti Bera, Subhamoy Maitra, SAPV Tharrmashastha:
Efficient Quantum Algorithms Related to Autocorrelation Spectrum. 415-432 - Boyu Ni, Gembu Ito, Xiaoyang Dong, Tetsu Iwata:
Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256. 433-455 - Jyotirmoy Basak, Arpita Maitra, Subhamoy Maitra:
Device Independent Quantum Key Distribution Using Three-Party Pseudo-Telepathy. 456-471 - Arpita Maitra, Suvra Sekhar Das:
Generalized Approach for Analysing Quantum Key Distribution Experiments. 472-491
Hardware: Efficiency, Side-Channel Resistance and PUFs
- Jonathan Sönnerup, Martin Hell, Mattias Sönnerup, Ripudaman Khattar:
Efficient Hardware Implementations of Grain-128AEAD. 495-513 - Fatih Balli, Subhadeep Banik:
Exploring Lightweight Efficiency of ForkAES. 514-534 - Timo Zijlstra, Karim Bigou, Arnaud Tisserand:
FPGA Implementation and Comparison of Protections Against SCAs for RLWE. 535-555 - Akhilesh Anilkumar Siddhanti, Srinivasu Bodapati, Anupam Chattopadhyay, Subhamoy Maitra, Dibyendu Roy, Pantelimon Stanica:
Analysis of the Strict Avalanche Criterion in Variants of Arbiter-Based Physically Unclonable Functions. 556-577
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.