Progress in Cryptology - INDOCRYPT 2009

10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings

  • Bimal Roy
  • Nicolas Sendrier
Conference proceedings INDOCRYPT 2009

DOI: 10.1007/978-3-642-10628-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5922)

Table of contents (28 papers)

  1. Front Matter
  2. Post-Quantum Cryptology

    1. Secure Parameters for SWIFFT
      Johannes Buchmann, Richard Lindner
      Pages 1-17
    2. FSBday
      Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe
      Pages 18-38
  3. Key Agreement Protocols

    1. Reusing Static Keys in Key Agreement Protocols
      Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu
      Pages 39-56
  4. Side Channel Attacks

    1. Fault Analysis of Rabbit: Toward a Secret Key Leakage
      Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
      Pages 72-87
    2. On Physical Obfuscation of Cryptographic Algorithms
      Julien Bringer, Hervé Chabanne, Thomas Icart
      Pages 88-103
    3. Cache Timing Attacks on Clefia
      Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga
      Pages 104-118
  5. Symmetric Cryptology

    1. Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode
      Thierry P. Berger, Marine Minier, Benjamin Pousse
      Pages 119-135
    2. On the Symmetric Negabent Boolean Functions
      Sumanta Sarkar
      Pages 136-143
    3. Improved Meet-in-the-Middle Attacks on AES
      Hüseyin Demirci, İhsan Taşkın, Mustafa Çoban, Adnan Baysal
      Pages 144-156
  6. Hash Functions

    1. Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode
      Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 157-168
    2. Second Preimage Attack on SHAMATA-512
      Kota Ideguchi, Dai Watanabe
      Pages 169-181
    3. Towards Secure and Practical MACs for Body Sensor Networks
      Zheng Gong, Pieter Hartel, Svetla Nikova, Bo Zhu
      Pages 182-198
    4. Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions
      Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi
      Pages 199-218
    5. A Distinguisher for the Compression Function of SIMD-512
      Florian Mendel, Tomislav Nad
      Pages 219-232
  7. Number Theoretic Cryptology

  8. Lightweight Cryptology

    1. Private Interrogation of Devices via Identification Codes
      Julien Bringer, Hervé Chabanne, Gérard Cohen, Bruno Kindarji
      Pages 272-289

About these proceedings


This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.

The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.


AES MSP 430 SHA-3 SHAMATA-512 SWIFFT algorithms body sensors calculus cryptography encryption hash function hash functions preimage attack quadratic residues signatures

Editors and affiliations

  • Bimal Roy
    • 1
  • Nicolas Sendrier
    • 2
  1. 1.Applied Statistics UnitIndian Statistical InstituteKolkataIndia
  2. 2.Projet Team SECRETCentre de Recherche INRIA RocquencourtLe Chesnay CedexFrance

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-10627-9
  • Online ISBN 978-3-642-10628-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349