default search action
INDOCRYPT 2007: Chennai, India
- K. Srinathan, C. Pandu Rangan, Moti Yung:
Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings. Lecture Notes in Computer Science 4859, Springer 2007, ISBN 978-3-540-77025-1
Hashing
- Markku-Juhani Olavi Saarinen:
Linearization Attacks Against Syndrome Based Hashes. 1-9 - Markku-Juhani Olavi Saarinen:
A Meet-in-the-Middle Collision Attack Against the New FORK-256. 10-17 - Kan Yasuda:
Multilane HMAC - Security beyond the Birthday Limit. 18-32
Elliptic Curve
- David Jao, Dimitar Jetchev, Ramarathnam Venkatesan:
On the Bits of Elliptic Curve Diffie-Hellman Keys. 33-47 - V. N. Muralidhara, Sandeep Sen:
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography. 48-57
Cryptoanalysis
- Gautham Sekar, Souradyuti Paul, Bart Preneel:
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. 58-72 - Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng:
Related-Key Differential-Linear Attacks on Reduced AES-192. 73-85 - Orr Dunkelman, Gautham Sekar, Bart Preneel:
Improved Meet-in-the-Middle Attacks on Reduced-Round DES. 86-100
Information Theoretic Security
- Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. 101-122 - Shlomi Dolev, Limor Lahiani, Moti Yung:
Secret Swarm UnitReactive k-Secret Sharing. 123-137
Elliptic Curve Cryptography
- Hüseyin Hisil, Gary Carter, Ed Dawson:
New Formulae for Efficient Elliptic Curve Arithmetic. 138-151 - Pradeep Kumar Mishra, Vassil S. Dimitrov:
A Graph Theoretic Analysis of Double Base Number Systems. 152-166 - Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters:
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication. 167-182
Signature
- Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang:
Transitive Signatures from Braid Groups. 183-196 - Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang:
Proxy Re-signature Schemes Without Random Oracles. 197-209
Side Channel Attack
- Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois:
First-Order Differential Power Analysis on the Duplication Method. 210-223 - K. Gopalakrishnan, Nicolas Thériault, Chui Zhi Yao:
Solving Discrete Logarithms from Partial Knowledge of the Key. 224-237
Symmetric Cryptosystem
- Wen Ji, Lei Hu:
New Description of SMS4 by an Embedding overGF(28). 238-251 - Kazuhiko Minematsu, Toshiyasu Matsushima:
Tweakable Enciphering Schemes from Hash-Sum-Expansion. 252-267 - Håkan Englund, Thomas Johansson, Meltem Sönmez Turan:
A Framework for Chosen IV Statistical Analysis of Stream Ciphers. 268-281
Asymmetric Cryptosystem
- Giovanni Di Crescenzo, Vishal Saraswat:
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. 282-296 - Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. 297-311
Short Presentation
- Muxiang Zhang:
Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues. 312-321 - Ramakanth Kavuluru, Andrew Klapper:
On the k -Operation Linear Complexity of Periodic Sequences. 322-330 - Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai:
Trade-Off Traitor Tracing. 331-340 - François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier:
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. 341-350 - Rana Barua, Sumit Kumar Pandey, Ravi Pankaj:
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System. 351-360 - Duo Lei, Chao Li:
Extended Multi-Property-Preserving and ECM-Construction. 361-372 - Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Design of a Differential Power Analysis Resistant Masked AES S-Box. 373-383 - Sanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan:
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. 384-392 - Praveen Gauravaram, Katsuyuki Okeya:
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. 393-403 - Frédéric Didier:
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function. 404-413 - Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez:
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. 414-424
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.