Progress in Cryptology INDOCRYPT 2020

This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December 2020.The 39 full papers presented together with 3 invited abstracts in this ...

Author: Karthikeyan Bhargavan

Publisher: Springer Nature

ISBN: 9783030652777

Category: Computers

Page: 906

View: 487

Download →

This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December 2020.The 39 full papers presented together with 3 invited abstracts in this book were carefully reviewed and selected from 84 submissions. Apart from its traditional focus on areas in applied and theoretical cryptology, this year INDOCRYPT solicited papers in the area of Formal Methods for Cryptographic Systems as well and much more.
Posted in:

Progress in Cryptology INDOCRYPT 2021

19(9), 1–17 (2020) 2. Anand, R., Maitra, A., Mukhopadhyay, S.: Evaluation of quantum cryptanalysis on SPECK. In: Bhargavan, K., Oswald, E., Prabhakaran, M. (eds.) INDOCRYPT 2020. LNCS, vol. 12578, pp. 395–413. Springer, Cham (2020).

Author: Avishek Adhikari

Publisher: Springer Nature

ISBN: 9783030925185

Category: Computers

Page: 634

View: 377

Download →

This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021. The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.
Posted in:

Progress in Cryptology INDOCRYPT 2006

In D. Naccache, editor, Progress in Cryptology - CT-RSA 2001, volume 2020 of Lecture Notes in Computer Science, pages 266–281, Springer-Verlag, 2001. N. Courtois. Algebraic attacks on combiners with memory and several outputs.

Author: Rana Barua

Publisher: Springer

ISBN: 9783540497691

Category: Computers

Page: 458

View: 728

Download →

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006. The 29 revised full papers and 2 invited papers cover such topics as symmetric cryptography, provable security, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.
Posted in:

Advances in Cryptology EUROCRYPT 2020

CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness (2014–2019). ... Progress in Cryptology - INDOCRYPT 2008: 9th International Conference in Cryptology in India, Kharagpur, India 14–17 December ...

Author: Anne Canteaut

Publisher: Springer Nature

ISBN: 9783030457242

Category: Computers

Page: 861

View: 458

Download →

The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.
Posted in:

Progress in Cryptology INDOCRYPT 2019

This work was supported by the European Commission through the Horizon 2020 research and innovation program under grant agreement H2020-DSLEIT-2017-780108 FENTEC, by the Flemish Government through FWO SBO project SNIPPETS007619N and by ...

Author: Feng Hao

Publisher: Springer Nature

ISBN: 9783030354237

Category: Computers

Page: 580

View: 597

Download →

This book constitutes the refereed proceedings of the 20th International Conference on Cryptology in India, INDOCRYPT 2019, held in Hyderabad, India, in December 2019. The 28 revised full papers presented in this book were carefully reviewed and selected from 110 submissions (of which 20 were either rejected without being reviewed or withdrawn before the deadline). The focus of the conference includes works on signatures and filter permutators; symmetric key ciphers and hash functions; blockchain, secure computation and blind coupon mechanism; oblivious transfer, obfuscation and privacy amplification; Boolean functions, elliptic curves and lattices; algorithms, attacks and distribution; and efficiency, side-channel resistance and PUFs.
Posted in:

Progress in Cryptology INDOCRYPT 2005

In Advances in cryptology, CRYPTO'98, 6th International Conference, (AAECC-6), volume 1462, pages 472–485. Springer-Verlag, 1998. 2. D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. Lecture Notes in Computer ...

Author: Subhamoy Maitra

Publisher: Springer

ISBN: 9783540322788

Category: Computers

Page: 420

View: 495

Download →

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology in India, INDOCRYPT 2005, held in Bangalore, India in December 2005. The 31 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on sequences, boolean function and S-box, hash functions, design principles, cryptanalysis, time memory trade-off, new constructions, pairings, signatures, applications, e-cash, and implementations.
Posted in:

Progress in Cryptology INDOCRYPT 2004

H. Handschuh, L.R. Knudsen and M.J. Robshaw, Analysis of SHA-1 in Encryption Mode, CT-RSA 2001, LNCS 2020, pp. 70-83, Springer-Verlag, 2001. 7. P. Hawkes, Differential-Linear Weak-Key Classes of IDEA, Advances in Cryptology - EUROCRYPT ...

Author: International Conference in Cryptology in India (5 : 2004 : Chennai)

Publisher: Springer Science & Business Media

ISBN: 9783540241300

Category: Business & Economics

Page: 429

View: 602

Download →

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology in India, INDOCRYPT 2004, held in Chennai, India in December 2004. The 30 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 181 submissions. The papers are organized in topical sections on cryptographic protocols, applications, stream ciphers, cryptographic Boolean functions, foundations, block ciphers, public key encryption, efficient representations, public key cryptanalysis, modes of operation, signatures, and traitor tracing and visual cryptography.
Posted in:

Progress in Cryptology LATINCRYPT 2021

7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, ... Submission to the NIST post-quantum cryptography standardization project (2020) 3. ... INDOCRYPT 2020.

Author: Patrick Longa

Publisher: Springer Nature

ISBN: 9783030882389

Category: Computers

Page: 473

View: 551

Download →

This book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021. The conference was originally planned to take place in Bogota, Colombia, but changed to a virtual event due to the COVID-19 pandemic. The 22 full papers included in this volume were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: quantum cryptography; post-quantum cryptography; asymmetric cryptanalysis; cryptanalysis and side-channel analysis; distributed cryptographic protocols; and multiparty computation.
Posted in:

Progress in Cryptology INDOCRYPT 2001

Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 India) International Conference in Cryptology in India 2001 (Madras, C. Pandu Rangan Cunsheng Ding. method. We thus hope that our work can ...

Author: India) International Conference in Cryptology in India 2001 (Madras

Publisher: Springer Science & Business Media

ISBN: 9783540430100

Category: Computers

Page: 349

View: 109

Download →

This book constitutes the refereed proceedings of the Second International Conference in Cryptology in India, INDOCRYPT 2001, held in Chennai, India in December 2001. The 31 revised full papers presented together with an invited survey were carefully reviewed and selected from 77 submissions. The papers are organized in topical sections on hashing, algebraic schemes, elliptic curves, coding theory, applications, cryptanalysis, distributed cryptography, Boolean functions, digitial signatures, and shift registers.
Posted in:

Progress in Cryptology INDOCRYPT 2003

M. Jakobsson, D. Pointcheval and A. Young, “Secure mobile gambling”, in Topics in Cryptology - CT-RSA 2001, (ed. D. Naccache), LNCS 2020, Springer-Verlag, pp. 100-109, San Francisco, CA, USA, April 8-12, 2001. 18.

Author: Thomas Johansson

Publisher: Springer

ISBN: 9783540245827

Category: Computers

Page: 436

View: 391

Download →

This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India in December 2003. The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on stream ciphers, block ciphers, Boolean functions, secret sharing, bilinear pairings, public key cryptography, signature schemes, protocols, elliptic curve cryptography and algebraic geometry, implementation and digital watermarking, and authentication.
Posted in: