Description |
1 online resource (xviii, 319 pages) : illustrations |
Series |
Lecture Notes in Computer Science, 0302-9743 ; 8250 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 8250. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Provable Security -- Key-Private Proxy Re-encryption under LWE / Yoshinori Aono [and others] -- Breaking the O(nC) Barrier for Unconditionally Secure Asynchronous Multiparty Computation / Ashish Choudhury -- Alternating Product Ciphers: A Case for Provable Security Comparisons / John O. Pliam --tHash Functions and Signatures -- An Integral Distinguisher on Grøstl-512 v3 / Marine Minier, Gaël Thomas -- Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes / Christian Hanser, Daniel Slamanig --tSide Channel Attacks I -- Improved Scan-Chain Based Attacks and Related Countermeasures / Subhadeep Banik, Anusha Chowdhury -- Correlation Analysis against Protected SFM Implementations of RSA / Aurélie Bauer, Éliane Jaulmes --tSymmetric Key Cryptanalysis I -- Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis / Christophe Clavier, Quentin Isorez, Antoine Wurcker -- Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN / Donghoon Chang, Abhishek Kumar, Somitra Sanadhya -- Improbable Differential from Impossible Differential: On the Validity of the Model / Céline Blondeau --tKey Exchange and Secret Sharing -- Compact Authenticated Key Exchange from Bounded CCA-Secure KEM / Kazuki Yoneyama -- On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection / Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini --tSide Channel Attacks II -- There's Something about m-ary / Benoit Feix, Vincent Verneuil -- On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective / Fabrizio De Santis [and others] --tEfficient Implementation and Hardware -- Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors / Hwajeong Seo [and others] -- 8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors / Erich Wenger, Thomas Unterluggauer, Mario Werner -- Accelerating Sorting of Fully Homomorphic Encrypted Data / Ayantika Chatterjee, Manish Kaushal, Indranil Sengupta --tCoding Theory in Cryptography -- Construction of Recursive MDS Diffusion Layers from Gabidulin Codes / Thierry P. Berger -- Polynomial Structures in Code-Based Cryptography / Vlad Dragoi [and others] --tSymmetric Key Cryptanalysis II -- Security Analysis of the RC4+ Stream Cipher / Subhadeep Banik, Santanu Sarkar, Raghu Kacker -- On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible Differentials / Marine Minier |
Summary |
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on provable security; hash functions and signatures; side channel attacks; symmetric key cryptanalysis; key exchange and secret sharing; efficient implementation and hardware; and coding theory in cryptography |
Analysis |
computerwetenschappen |
|
computer sciences |
|
gegevensbeheer |
|
data management |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Notes |
International conference proceedings |
Bibliography |
Includes bibliographical references and author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed December 10, 2013) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
Conference papers and proceedings
|
Form |
Electronic book
|
Author |
Paul, Goutam, editor
|
|
Vaudenay, Serge, editor
|
ISBN |
9783319035154 |
|
3319035150 |
|
3319035142 |
|
9783319035147 |
|