Advertisement

Progress in Cryptology – INDOCRYPT 2019

20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings

  • Feng Hao
  • Sushmita Ruj
  • Sourav Sen Gupta
Conference proceedings INDOCRYPT 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11898)

Also part of the Security and Cryptology book sub series (LNSC, volume 11898)

Table of contents

  1. Front Matter
    Pages i-xxiii
  2. Constructions: Signatures and Filter Permutators

    1. Front Matter
      Pages 1-1
    2. Ward Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret
      Pages 3-22
    3. Thaís Bardini Idalino, Lucia Moura, Carlisle Adams
      Pages 23-44
    4. Sanjit Chatterjee, R. Kabaleeshwaran
      Pages 45-67
    5. Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert
      Pages 68-91
  3. Cryptanalysis: Symmetric Key Ciphers and Hash Functions

    1. Front Matter
      Pages 93-93
    2. Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra
      Pages 95-114
    3. Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier
      Pages 139-159
    4. Abhishek Kesarwani, Santanu Sarkar, Ayineedi Venkateswarlu
      Pages 160-174
  4. Protocols: Blockchain, Secure Computation and Blind Coupon Mechanism

    1. Front Matter
      Pages 193-193
    2. Arijit Dutta, Arnab Jana, Saravanan Vijayakumaran
      Pages 195-215
    3. Sibi Raj B. Pillai, Manoj Prabhakaran, Vinod M. Prabhakaran, Srivatsan Sridhar
      Pages 216-226
    4. Colin Boyd, Kristian Gjøsteen, Clémentine Gritti, Thomas Haines
      Pages 250-270
  5. Theory: Oblivious Transfer, Obfuscation and Privacy Amplification

    1. Front Matter
      Pages 271-271
    2. Aditya Damodaran, Maria Dubovitskaya, Alfredo Rial
      Pages 273-296
    3. Eshan Chattopadhyay, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar
      Pages 318-337
  6. Mathematics: Boolean Functions, Elliptic Curves and Lattices

    1. Front Matter
      Pages 339-339
    2. Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha
      Pages 361-374
    3. Peter Schwabe, Daan Sprenkels
      Pages 375-397
  7. Quantum: Algorithms, Attacks and Key Distribution

    1. Front Matter
      Pages 413-413
    2. Debajyoti Bera, Subhamoy Maitra, Sapv Tharrmashastha
      Pages 415-432
    3. Boyu Ni, Gembu Ito, Xiaoyang Dong, Tetsu Iwata
      Pages 433-455
    4. Jyotirmoy Basak, Arpita Maitra, Subhamoy Maitra
      Pages 456-471
    5. Arpita Maitra, Suvra Sekhar Das
      Pages 472-491
  8. Hardware: Efficiency, Side-Channel Resistance and PUFs

    1. Front Matter
      Pages 493-493
    2. Jonathan Sönnerup, Martin Hell, Mattias Sönnerup, Ripudaman Khattar
      Pages 495-513
    3. Fatih Balli, Subhadeep Banik
      Pages 514-534
    4. Timo Zijlstra, Karim Bigou, Arnaud Tisserand
      Pages 535-555
    5. Akhilesh Anilkumar Siddhanti, Srinivasu Bodapati, Anupam Chattopadhyay, Subhamoy Maitra, Dibyendu Roy, Pantelimon Stănică
      Pages 556-577
  9. Back Matter
    Pages 579-580

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 20th International Conference on Cryptology in India, INDOCRYPT 2019, held in Hyderabad, India, in December 2019.

The 28 revised full papers presented in this book were carefully reviewed and selected from 110 submissions (of which 20 were either rejected without being reviewed or withdrawn before the deadline). The focus of the conference includes works on signatures and filter permutators; symmetric key ciphers and hash functions; blockchain, secure computation and blind coupon mechanism; oblivious transfer, obfuscation and privacy amplification; Boolean functions, elliptic curves and lattices; algorithms, attacks and distribution; and efficiency, side-channel resistance and PUFs.


Keywords

authentication block ciphers blockchain computer hardware computer networks computer security computer systems cryptanalysis cryptographic protocols cryptography data mining data security encryption mathematics network protocols network security privacy preserving public key cryptography signal processing

Editors and affiliations

  • Feng Hao
    • 1
  • Sushmita Ruj
    • 2
  • Sourav Sen Gupta
    • 3
  1. 1.University of WarwickWarwickUK
  2. 2.CSIRO Data61MarsfieldAustralia
  3. 3.Nanyang Technological UniversitySingaporeSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-35423-7
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-35422-0
  • Online ISBN 978-3-030-35423-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site