Progress in Cryptology - INDOCRYPT 2012

13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings

Editors:

ISBN: 978-3-642-34930-0 (Print) 978-3-642-34931-7 (Online)

Table of contents (31 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Papers

    1. No Access

      Book Chapter

      Pages 1-15

      How to Compute on Encrypted Data

    2. No Access

      Book Chapter

      Pages 16-16

      From Multiple Encryption to Knapsacks – Efficient Dissection of Composite Problems

    3. No Access

      Book Chapter

      Pages 17-39

      Using the Cloud to Determine Key Strengths

  3. Protocol

    1. No Access

      Book Chapter

      Pages 40-59

      A Unified Characterization of Completeness and Triviality for Secure Function Evaluation

    2. No Access

      Book Chapter

      Pages 60-79

      On the Non-malleability of the Fiat-Shamir Transform

    3. No Access

      Book Chapter

      Pages 80-99

      Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84

    4. No Access

      Book Chapter

      Pages 100-119

      On-Line/Off-Line Leakage Resilient Secure Computation Protocols

  4. Side Channel

    1. No Access

      Book Chapter

      Pages 120-139

      Leakage Squeezing of Order Two

    2. No Access

      Book Chapter

      Pages 140-155

      ROSETTA for Single Trace Analysis

  5. Hash Functions and Stream Cipher

    1. No Access

      Book Chapter

      Pages 156-171

      Collision Attack on the Hamsi-256 Compression Function

    2. No Access

      Book Chapter

      Pages 172-190

      Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks

    3. No Access

      Book Chapter

      Pages 191-208

      A Differential Fault Attack on the Grain Family under Reasonable Assumptions

    4. No Access

      Book Chapter

      Pages 209-224

      Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs

  6. Cryptanalysis of Block Ciphers

    1. No Access

      Book Chapter

      Pages 225-243

      Faster Chosen-Key Distinguishers on Reduced-Round AES

    2. No Access

      Book Chapter

      Pages 244-264

      The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher

    3. No Access

      Book Chapter

      Pages 265-282

      Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds

    4. No Access

      Book Chapter

      Pages 283-302

      Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers

  7. Time Memory Trade-Off

    1. No Access

      Book Chapter

      Pages 303-316

      High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System

    2. No Access

      Book Chapter

      Pages 317-338

      Computing Small Discrete Logarithms Faster

  8. Hardware

    1. No Access

      Book Chapter

      Pages 339-357

      Embedded Syndrome-Based Hashing

previous Page of 2