Progress in Cryptology - INDOCRYPT 2012

13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings

  • Steven Galbraith
  • Mridul Nandi
Conference proceedings INDOCRYPT 2012

DOI: 10.1007/978-3-642-34931-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7668)

Table of contents (31 papers)

  1. Front Matter
  2. Invited Papers

    1. How to Compute on Encrypted Data
      Vinod Vaikuntanathan
      Pages 1-15
    2. Using the Cloud to Determine Key Strengths
      Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart
      Pages 17-39
  3. Protocol

    1. A Unified Characterization of Completeness and Triviality for Secure Function Evaluation
      Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
      Pages 40-59
    2. On the Non-malleability of the Fiat-Shamir Transform
      Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi
      Pages 60-79
    3. On-Line/Off-Line Leakage Resilient Secure Computation Protocols
      Chaya Ganesh, Vipul Goyal, Satya Lokam
      Pages 100-119
  4. Side Channel

    1. Leakage Squeezing of Order Two
      Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi
      Pages 120-139
    2. ROSETTA for Single Trace Analysis
      Christophe Clavier, Benoit Feix, Georges Gagnerot, Christophe Giraud, Mylène Roussellet, Vincent Verneuil
      Pages 140-155
  5. Hash Functions and Stream Cipher

    1. Collision Attack on the Hamsi-256 Compression Function
      Mario Lamberger, Florian Mendel, Vincent Rijmen
      Pages 156-171
    2. Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks
      Tuomas Kortelainen, Ari Vesanen, Juha Kortelainen
      Pages 172-190
    3. A Differential Fault Attack on the Grain Family under Reasonable Assumptions
      Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar
      Pages 191-208
    4. Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs
      Thierry P. Berger, Marine Minier
      Pages 209-224
  6. Cryptanalysis of Block Ciphers

  7. Time Memory Trade-Off

    1. High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System
      Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, Sung-Ryul Kim
      Pages 303-316
    2. Computing Small Discrete Logarithms Faster
      Daniel J. Bernstein, Tanja Lange
      Pages 317-338

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Editors and affiliations

  • Steven Galbraith
    • 1
  • Mridul Nandi
    • 2
  1. 1.Department of MathematicsUniversity of AucklandAucklandNew Zealand
  2. 2.Indian Statistical Institute, Applied Statistics UnitKolkataIndia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34930-0
  • Online ISBN 978-3-642-34931-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349