default search action
INDOCRYPT 2006: Kolkata, India
- Rana Barua, Tanja Lange:
Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings. Lecture Notes in Computer Science 4329, Springer 2006, ISBN 3-540-49767-6
Invited Talk
- James L. Massey:
Whither Cryptography? 1
Symmetric Cryptography: Attacks
- Simon Fischer, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw:
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. 2-16 - Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman:
Differential and Rectangle Attacks on Reduced-Round SHACAL-1. 17-31 - Kenneth Koon-Ho Wong, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai:
Algebraic Attacks on Clock-Controlled Cascade Ciphers. 32-47 - Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura:
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. 48-62
Hash Functions
- Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe:
Update on Tiger. 63-79 - Donghoon Chang, Kishan Chand Gupta, Mridul Nandi:
RC4-Hash: A New Hash Function Based on RC4. 80-94 - Markku-Juhani Olavi Saarinen:
Security of VSH in the Real World. 95-103
Provable Security: Key Agreement
- Raphael C.-W. Phan, Bok-Min Goi:
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. 104-117 - Weijia Wang, Lei Hu:
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. 118-132 - Alfred Menezes, Berkant Ustaoglu:
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols. 133-147
Invited Talk
- Neal Koblitz, Alfred Menezes:
Another Look at "Provable Security". II. 148-175
Provable Security: Public Key Cryptography
- Jaimee Brown, Juan Manuel González Nieto, Colin Boyd:
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. 176-190 - Isamu Teranishi, Takuro Oyama, Wakaha Ogata:
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. 191-205 - Ian F. Blake, Aldar C.-F. Chan:
Conditionally Verifiable Signature. 206-220 - Arpita Patra, Ashish Choudhary, K. Srinathan, C. Pandu Rangan:
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission. 221-235
Symmetric Cryptography: Design
- Frédéric Didier:
Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks. 236-250 - Valery Pryamikov:
Enciphering with Arbitrary Small Finite Domains. 251-265 - Selçuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yücel:
Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240. 266-279
Modes of Operation and Message Authentication Codes
- Peng Wang, Dengguo Feng, Wenling Wu:
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. 280-286 - Debrup Chakraborty, Palash Sarkar:
HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach. 287-302 - Ryo Nojima, Kazukuni Kobara, Hideki Imai:
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. 303-316 - Mridul Nandi:
A Simple and Unified Method of Proving Indistinguishability. 317-334
Fast Implementation of Public Key Cryptography
- Christophe Doche, Laurent Imbert:
Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. 335-348 - Johannes Buchmann, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich:
CMSS - An Improved Merkle Signature Scheme. 349-363
ID-Based Cryptography
- Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen:
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. 364-378 - Manuel Barbosa, Pooya Farshim:
Secure Cryptographic Workflow in the Standard Model. 379-393 - Sanjit Chatterjee, Palash Sarkar:
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. 394-408 - Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma:
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. 409-423
Embedded System and Side Channel Attacks
- Matthew Darnall, Doug Kuhlman:
AES Software Implementations on ARM7TDMI. 424-435 - Antoine Joux, Pascal Delaunay:
Galois LFSR, Embedded Devices and Side Channel Weaknesses. 436-451
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.