Limit search to available items
Book Cover
E-book
Author International Conference in Cryptology in India (14th : 2013 : Mumbai, India)

Title Progress in Cryptology-- INDOCRYPT 2013 : 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings / Goutam Paul, Serge Vaudenay (eds.)
Published Cham : Springer, 2013

Copies

Description 1 online resource (xviii, 319 pages) : illustrations
Series Lecture Notes in Computer Science, 0302-9743 ; 8250
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8250. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Provable Security -- Key-Private Proxy Re-encryption under LWE / Yoshinori Aono [and others] -- Breaking the O(nC) Barrier for Unconditionally Secure Asynchronous Multiparty Computation / Ashish Choudhury -- Alternating Product Ciphers: A Case for Provable Security Comparisons / John O. Pliam --tHash Functions and Signatures -- An Integral Distinguisher on Grøstl-512 v3 / Marine Minier, Gaël Thomas -- Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes / Christian Hanser, Daniel Slamanig --tSide Channel Attacks I -- Improved Scan-Chain Based Attacks and Related Countermeasures / Subhadeep Banik, Anusha Chowdhury -- Correlation Analysis against Protected SFM Implementations of RSA / Aurélie Bauer, Éliane Jaulmes --tSymmetric Key Cryptanalysis I -- Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis / Christophe Clavier, Quentin Isorez, Antoine Wurcker -- Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN / Donghoon Chang, Abhishek Kumar, Somitra Sanadhya -- Improbable Differential from Impossible Differential: On the Validity of the Model / Céline Blondeau --tKey Exchange and Secret Sharing -- Compact Authenticated Key Exchange from Bounded CCA-Secure KEM / Kazuki Yoneyama -- On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection / Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini --tSide Channel Attacks II -- There's Something about m-ary / Benoit Feix, Vincent Verneuil -- On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective / Fabrizio De Santis [and others] --tEfficient Implementation and Hardware -- Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors / Hwajeong Seo [and others] -- 8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors / Erich Wenger, Thomas Unterluggauer, Mario Werner -- Accelerating Sorting of Fully Homomorphic Encrypted Data / Ayantika Chatterjee, Manish Kaushal, Indranil Sengupta --tCoding Theory in Cryptography -- Construction of Recursive MDS Diffusion Layers from Gabidulin Codes / Thierry P. Berger -- Polynomial Structures in Code-Based Cryptography / Vlad Dragoi [and others] --tSymmetric Key Cryptanalysis II -- Security Analysis of the RC4+ Stream Cipher / Subhadeep Banik, Santanu Sarkar, Raghu Kacker -- On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible Differentials / Marine Minier
Summary This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on provable security; hash functions and signatures; side channel attacks; symmetric key cryptanalysis; key exchange and secret sharing; efficient implementation and hardware; and coding theory in cryptography
Analysis computerwetenschappen
computer sciences
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes International conference proceedings
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed December 10, 2013)
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security
Data encryption (Computer science)
Genre/Form Conference papers and proceedings
Form Electronic book
Author Paul, Goutam, editor
Vaudenay, Serge, editor
ISBN 9783319035154
3319035150
3319035142
9783319035147