default search action
INDOCRYPT 2011: Chennai, India
- Daniel J. Bernstein, Sanjit Chatterjee:
Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings. Lecture Notes in Computer Science 7107, Springer 2011, ISBN 978-3-642-25577-9
Tutorial 1
- Roger Dingledine:
Tor and the Censorship Arms Race: Lessons Learned. 1
Tutorial 2
- Tanja Lange:
Elliptic Curves for Applications. 2
Side-Channel Attacks
- Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology. 3-21 - Maxime Nassar, Sylvain Guilley, Jean-Luc Danger:
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks. 22-39 - Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil:
Square Always Exponentiation. 40-57 - Chester Rebeiro, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay:
An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines. 58-75 - Santanu Sarkar:
Partial Key Exposure: Generalized Framework to Attack RSA. 76-92
Invited Talk 1
- Christof Paar:
The Yin and Yang Sides of Embedded Security. 93
Secret-Key Cryptography, Part 1
- Michael Gorski, Thomas Knapke, Eik List, Stefan Lucks, Jakob Wenzel:
Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule. 94-113 - Martin Ågren, Thomas Johansson:
Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere. 114-133 - Jean-Philippe Aumasson, María Naya-Plasencia, Markku-Juhani O. Saarinen:
Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN. 134-145 - Phuong Ha Nguyen, Matthew J. B. Robshaw, Huaxiong Wang:
On Related-Key Attacks and KASUMI: The Case of A5/3. 146-159
Invited Talk 2
- Ross J. Anderson:
Cryptology: Where Is the New Frontier? 160
Secret-Key Cryptography, Part 2
- Jin Hong, Ga Won Lee, Daegun Ma:
Analysis of the Parallel Distinguished Point Tradeoff. 161-180 - Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
On the Evolution of GGHN Cipher. 181-195 - Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid:
HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers. 196-215 - Mohammad Hassan Habibi, Mohammad Reza Aref, Di Ma:
Addressing Flaws in RFID Authentication Protocols. 216-235
Hash Functions
- María Naya-Plasencia, Andrea Röck, Willi Meier:
Practical Analysis of Reduced-Round Keccak. 236-254 - Florian Mendel, Tomislav Nad:
Boomerang Distinguisher for the SIMD-512 Compression Function. 255-269 - Jens-Peter Kaps, Panasayya Yalla, Kishore Kumar Surapathi, Bilal Habib, Susheel Vadlamudi, Smriti Gurung, John Pham:
Lightweight Implementations of SHA-3 Candidates on FPGAs. 270-289
Pairings
- Roy D'Souza, David Jao, Ilya Mironov, Omkant Pandey:
Publicly Verifiable Secret Sharing for Cloud-Based Key Management. 290-309 - Robert Drylo:
On Constructing Families of Pairing-Friendly Elliptic Curves with Variable Discriminant. 310-319 - Craig Costello, Kristin E. Lauter, Michael Naehrig:
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings. 320-342
Invited Talk 3
- Eric Rescorla:
Stone Knives and Bear Skins: Why Does the Internet Run on Pre-historic Cryptography? 343
Protocols
- Hemanta K. Maji, Manoj Prabhakaran:
The Limits of Common Coins: Further Results. 344-358 - Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Secure Message Transmission in Asynchronous Directed Graphs. 359-378 - Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto:
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy. 379-398
Tutorial 3
- Shay Gueron:
Software Optimizations for Cryptographic Primitives on General Purpose x86_64 Platforms. 399-400
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.