default search action
INDOCRYPT 2016: Kolkata, India
- Orr Dunkelman, Somitra Kumar Sanadhya:
Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Lecture Notes in Computer Science 10095, 2016, ISBN 978-3-319-49889-8
Public-Key Cryptography
- Louis Goubin, Francisco José Vial Prado:
Blending FHE-NTRU Keys - The Excalibur Property. 3-24 - Yamin Liu, Xianhui Lu, Bao Li, Wenpan Jing, Fuyang Fang:
Approximate-Deterministic Public Key Encryption from Hard Learning Problems. 25-42 - Neetu Sharma, Rajeev Anand Sahu, Vishal Saraswat, Birendra Kumar Sharma:
Adaptively Secure Strong Designated Signature. 43-60 - Mohamed Saied Emam Mohamed, Albrecht Petzoldt:
The Shortest Signatures Ever. 61-77
Cryptographic Protocols
- Lakshmi Kuppusamy, Jothi Rangasamy:
CRT-Based Outsourcing Algorithms for Modular Exponentiations. 81-98 - Muhua Liu, Ying Wu, Rui Xue:
Verifiable Computation for Randomized Algorithm. 99-118 - Lin Zhang, Zhenfeng Zhang:
UC-secure and Contributory Password-Authenticated Group Key Exchange. 119-134
Side-Channel Attacks
- Marios O. Choudary, Romain Poussier, François-Xavier Standaert:
Score-Based vs. Probability-Based Enumeration - A Cautionary Note. 137-152 - Peter Pessl:
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures. 153-170
Implementation of Cryptographic Schemes
- Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. 173-190 - Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA. 191-206 - Ekawat Homsirikamol, Kris Gaj:
AEZ: Anything-But EaZy in Hardware. 207-224
Functional Encryption
- Afonso Arriaga, Manuel Barbosa, Pooya Farshim:
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation. 227-247 - Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, Kwangjo Kim:
Revocable Decentralized Multi-Authority Functional Encryption. 248-265
Symmetric-Key Cryptanalysis
- Tomer Ashur, Vincent Rijmen:
On Linear Hulls and Trails. 269-286 - David Gérault, Pascal Lafourcade:
Related-Key Cryptanalysis of Midori. 287-304 - Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi:
Some Proofs of Joint Distributions of Keystream Biases in RC4. 305-321 - Lorenzo Grassi, Christian Rechberger:
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE. 322-342
Foundations
- Douglas Miller, Adam Scrivener, Jesse Stern, Muthuramakrishnan Venkitasubramaniam:
On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography. 345-363 - Theo Fanuela Prabowo, Chik How Tan:
Implicit Quadratic Property of Differentially 4-Uniform Permutations. 364-379 - Mahabir Prasad Jhanwar, Kannan Srinathan:
Secret Sharing for mNP: Completeness Results. 380-390
New Cryptographic Constructions
- Dingding Jia, Xianhui Lu, Bao Li:
Receiver Selective Opening Security from Indistinguishability Obfuscation. 393-410 - Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray:
Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes. 411-428
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.