Limit search to available items
Book Cover
E-book
Author International Conference in Cryptology in India (13th : 2012 : Kolkata, India)

Title Progress in cryptology-- INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings / Steven Galbraith, Mridul Nandi (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource (xiii, 566 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 7668
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7668.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Invited Papers -- How to Compute on Encrypted Data / Vinod Vaikuntanathan -- From Multiple Encryption to Knapsacks -- Efficient Dissection of Composite Problems / Orr Dunkelman -- Using the Cloud to Determine Key Strengths / Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart -- Protocol -- A Unified Characterization of Completeness and Triviality for Secure Function Evaluation / Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek -- On the Non-malleability of the Fiat-Shamir Transform / Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi -- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 / Arpita Maitra, Goutam Paul -- On-Line/Off-Line Leakage Resilient Secure Computation Protocols / Chaya Ganesh, Vipul Goyal, Satya Lokam -- Side Channel -- Leakage Squeezing of Order Two / Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi
ROSETTA for Single Trace Analysis / Christophe Clavier, Benoit Feix, Georges Gagnerot, Christophe Giraud, Mylène Roussellet -- Hash Functions and Stream Cipher -- Collision Attack on the Hamsi-256 Compression Function / Mario Lamberger, Florian Mendel, Vincent Rijmen -- Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks / Tuomas Kortelainen, Ari Vesanen, Juha Kortelainen -- A Differential Fault Attack on the Grain Family under Reasonable Assumptions / Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar -- Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs / Thierry P. Berger, Marine Minier -- Cryptanalysis of Block Ciphers -- Faster Chosen-Key Distinguishers on Reduced-Round AES / Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean -- The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher / Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic
Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds / Yu Sasaki -- Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers / Shengbao Wu, Mingsheng Wang -- Time Memory Trade-Off -- High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System / Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, Sung-Ryul Kim -- Computing Small Discrete Logarithms Faster / Daniel J. Bernstein, Tanja Lange -- Hardware -- Embedded Syndrome-Based Hashing / Ingo von Maurich, Tim Güneysu -- Hardware -- Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA / Thomas Plos, Christoph Dobraunig, Markus Hofinger, Alexander Oprisnik -- Elliptic Curve -- Efficient Arithmetic on Elliptic Curves in Characteristic 2 / David Kohel -- A New Model of Binary Elliptic Curves / Hongfeng Wu, Chunming Tang, Rongquan Feng
Analysis of Optimum Pairing Products at High Security Levels / Xusheng Zhang, Dongdai Lin -- Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian / Robert Dryło -- Digital Signature -- Faster Batch Forgery Identification / Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk -- Implementing CFS / Gregory Landais, Nicolas Sendrier -- Symmetric Key Design and Provable Security -- SipHash: A Fast Short-Input PRF / Jean-Philippe Aumasson, Daniel J. Bernstein -- A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA / Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj -- Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers / Aslı Bay, Atefeh Mashatan, Serge Vaudenay -- Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme / Donghoon Chang
Summary This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols
Analysis Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Systems and Data Security
Bibliography Includes bibliographical references and author index
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Informatique.
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Galbraith, Steven D.
Nandi, Mridul
ISBN 9783642349317
3642349315
3642349307
9783642349300
Other Titles INDOCRYPT 2012