default search action
22nd INDOCRYPT 2021: India, Jaipur, India
- Avishek Adhikari, Ralf Küsters, Bart Preneel:
Progress in Cryptology - INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings. Lecture Notes in Computer Science 13143, Springer 2021, ISBN 978-3-030-92517-8
Authenticated Encryption
- Shay Gueron, Ashwin Jha, Mridul Nandi:
Revisiting the Security of COMET Authenticated Encryption Scheme. 3-25 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi:
tHyENA: Making HyENA Even Smaller. 26-48 - K. V. L. Bhargavi, Chungath Srinivasan, K. V. Lakshmy:
Panther: A Sponge Based Lightweight Authenticated Encryption Scheme. 49-70
Symmetric Cryptography
- Rishiraj Bhattacharyya, Mridul Nandi, Anik Raychaudhuri:
Crooked Indifferentiability of Enveloped XOR Revisited. 73-92 - Qi Da, Shanjie Xu, Chun Guo:
Sequential Indifferentiability of Confusion-Diffusion Networks. 93-113 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. 114-137
Lightweight Cryptography
- Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe:
Three Input Exclusive-OR Gate Support for Boyar-Peralta's Algorithm. 141-158 - Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, Meiqin Wang:
Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes. 159-178 - Ravi Anand, Arpita Maitra, Subhamoy Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay:
Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover's Attacks. 179-198
Side-Channel Attacks
- Siemen Dhooghe:
Analyzing Masked Ciphers Against Transition and Coupling Effects. 201-223 - Abubakr Abdulgadir, Kamyar Mohajerani, Viet Ba Dang, Jens-Peter Kaps, Kris Gaj:
A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks. 224-245 - Andrea Caforio, Daniel Collins, Ognjen Glamocanin, Subhadeep Banik:
Improving First-Order Threshold Implementations of SKINNY. 246-267
Fault Attacks
- Bhagwan N. Bathe, Siddhartha Tiwari, Ravi Anand, Dibyendu Roy, Subhamoy Maitra:
Differential Fault Attack on Espresso. 271-286 - Andy Russon:
Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization. 287-310 - Julius Hermelink, Peter Pessl, Thomas Pöppelmann:
Fault-Enabled Chosen-Ciphertext Attacks on Kyber. 311-334
Post-Quantum Cryptography
- Robi Pedersen:
DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting. 337-361 - Surbhi Shaw, Ratna Dutta:
Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures. 362-386 - Sanjit Chatterjee, Akansha Dimri, Tapas Pandit:
Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting. 387-412
Public Key Encryption and Protocols
- Danilo Francati, Alessio Guidi, Luigi Russo, Daniele Venturi:
Identity-Based Matchmaking Encryption Without Random Oracles. 415-435 - Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide:
Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain. 436-461 - Deepak Kumaraswamy, Srinivas Vivek:
Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE. 462-484
Cryptographic Constructions
- Najwa Aaraj, Chiara Marcolla, Xiaojie Zhu:
Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy. 487-509 - Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Helger Lipmaa:
Smooth Zero-Knowledge Hash Functions. 510-535 - Kodai Toyoda, Daiki Miyahara, Takaaki Mizuki:
Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation. 536-555
Blockchains
- Mic Bowman, Debajyoti Das, Avradip Mandal, Hart Montgomery:
On Elapsed Time Consensus Protocols. 559-583 - Samuel Jaques, Hart Montgomery, Razvan Rosie, Arnab Roy:
Time-Release Cryptography from Minimal Circuit Assumptions. 584-606 - Matteo Campanelli, Hamidreza Khoshakhlagh:
Succinct Publicly-Certifiable Proofs - Or, Can a Blockchain Verify a Designated-Verifier Proof? 607-631
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.