Progress in Cryptology - INDOCRYPT 2010

11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings

  • Guang Gong
  • Kishan Chand Gupta
Conference proceedings INDOCRYPT 2010

DOI: 10.1007/978-3-642-17401-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6498)

Table of contents (24 papers)

  1. Front Matter
  2. Invited Talk

  3. Security of RSA and Multivariate Schemes

    1. Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions
      Santanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra
      Pages 2-16
    2. Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks
      Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann
      Pages 17-32
    3. CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key
      Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
      Pages 33-48
  4. Security Analysis, Pseudorandom Permutations and Applications

    1. Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols
      Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu
      Pages 49-68
    2. Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations
      Avradip Mandal, Jacques Patarin, Valerie Nachef
      Pages 69-81
    3. Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface
      Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve Schneider et al.
      Pages 98-114
  5. Invited Talk

  6. Hash Functions

    1. Cryptanalysis of Tav-128 Hash Function
      Ashish Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Masoumeh Safkhani, Majid Naderi
      Pages 118-130
    2. Speeding Up the Wide-Pipe: Secure and Fast Hashing
      Mridul Nandi, Souradyuti Paul
      Pages 144-162
  7. Attacks on Block Ciphers and Stream Ciphers

    1. New Boomerang Attacks on ARIA
      Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks
      Pages 163-175
    2. Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
      Gregory V. Bard, Nicolas T. Courtois, Jorge Nakahara Jr, Pouyan Sepehrdad, Bingsheng Zhang
      Pages 176-196
  8. Fast Cryptographic Computation

    1. Random Euclidean Addition Chain Generation and Its Application to Point Multiplication
      Fabien Herbaut, Pierre-Yvan Liardet, Nicolas Méloni, Yannick Téglia, Pascal Véron
      Pages 238-261
  9. Cryptanalysis of AES

About these proceedings


AES AES-128 CUDA Hashing Permutation ants block ciphers boomerang attacks calculus complexity cryptanalysis hardware encryption hash function hash functions key exposure attack

Editors and affiliations

  • Guang Gong
    • 1
  • Kishan Chand Gupta
    • 2
  1. 1.Department of Electrical and Computer EngineeringUniversity of WaterlooWaterlooCanada
  2. 2.Indian Statistical InstituteApplied Statistics UnitKolkataIndia

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-17400-1
  • Online ISBN 978-3-642-17401-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349