default search action
INDOCRYPT 2014: New Delhi, India
- Willi Meier, Debdeep Mukhopadhyay:
Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings. Lecture Notes in Computer Science 8885, Springer 2014, ISBN 978-3-319-13038-5
Side Channel Analysis - I
- Benoit Feix, Mylène Roussellet, Alexandre Venelli:
Side-Channel Analysis on Blinded Regular Scalar Multiplications. 3-20 - Lejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall:
Online Template Attacks. 21-36 - Prakash Dey, Avishek Adhikari:
Improved Multi-Bit Differential Fault Analysis of Trivium. 37-52 - Benoit Feix, Hugues Thiebeauld, Lucille Tordella:
Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel Analysis. 53-67
Theory
- Divya Gupta, Amit Sahai:
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption. 71-88 - Nishanth Chandran, Sanjam Garg:
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions. 89-103
Block Ciphers
- Michael Colburn, Liam Keliher:
Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers. 107-123 - Jialin Huang, Serge Vaudenay, Xuejia Lai:
On the Key Schedule of Lightweight Block Ciphers. 124-142 - Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo:
Cryptanalysis of Reduced-Round SIMON32 and SIMON48. 143-160 - Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen:
General Application of FFT in Cryptanalysis and Improved Attack on CAST-256. 161-176
Side Channel Analysis - II
- Subhadeep Banik, Anupam Chattopadhyay, Anusha Chowdhury:
Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013. 179-196 - Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
EscApe: Diagonal Fault Analysis of APE. 197-216
Cryptanalysis
- Inna Polak, Adi Shamir:
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions. 219-236 - Chao Xu, Bin Zhang, Dengguo Feng:
Linear Cryptanalysis of FASER128/256 and TriviA-ck. 237-254 - Santanu Sarkar, Ayineedi Venkateswarlu:
Partial Key Exposure Attack on CRT-RSA. 255-264 - Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin, Aikaterini Mitrokotsa:
On the Leakage of Information in Biometric Authentication. 265-280
Efficient Hardware Design
- Ayesha Khalid, Prasanna Ravi, Anupam Chattopadhyay, Goutam Paul:
One Word/Cycle HC-128 Accelerator via State-Splitting Optimization. 283-303 - N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann:
A Very Compact FPGA Implementation of LED and PHOTON. 304-321 - Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic:
S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go? 322-337
Protected Hardware Design
- Amir Moradi:
Wire-Tap Codes as Side-Channel Countermeasure - - An FPGA-Based Experiment -. 341-359 - Sumanta Sarkar, Subhamoy Maitra, Kaushik Chakraborty:
Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes. 360-373 - Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic:
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. 374-390
Elliptic Curves
- Kwang Ho Kim, Chol Ok Lee, Christophe Nègre:
Binary Edwards Curves Revisited. 393-408 - Steven D. Galbraith, Shishay W. Gebregiyorgis:
Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two. 409-427 - Jean-François Biasse, David Jao, Anirudh Sankar:
A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves. 428-442
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.