Advertisement

Progress in Cryptology – INDOCRYPT 2013

14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings

  • Goutam Paul
  • Serge Vaudenay

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8250)

Table of contents

  1. Front Matter
  2. Provable Security

  3. Hash Functions and Signatures

    1. Marine Minier, Gaël Thomas
      Pages 50-59
    2. Christian Hanser, Daniel Slamanig
      Pages 60-77
  4. Side Channel Attacks I

    1. Subhadeep Banik, Anusha Chowdhury
      Pages 78-97
    2. Aurélie Bauer, Éliane Jaulmes
      Pages 98-115
  5. Symmetric Key Cryptanalysis I

    1. Christophe Clavier, Quentin Isorez, Antoine Wurcker
      Pages 116-135
    2. Donghoon Chang, Abhishek Kumar, Somitra Sanadhya
      Pages 136-148
  6. Key Exchange and Secret Sharing

  7. Side Channel Attacks II

    1. Benoit Feix, Vincent Verneuil
      Pages 197-214
    2. Fabrizio De Santis, Michael Kasper, Stefan Mangard, Georg Sigl, Oliver Stein, Marc Stöttinger
      Pages 215-226
  8. Efficient Implementation and Hardware

    1. Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
      Pages 227-243
    2. Erich Wenger, Thomas Unterluggauer, Mario Werner
      Pages 244-261
    3. Ayantika Chatterjee, Manish Kaushal, Indranil Sengupta
      Pages 262-273
  9. Coding Theory in Cryptography

    1. Vlad Dragoi, Pierre-Louis Cayrel, Brice Colombier, Tania Richmond
      Pages 286-296
  10. Symmetric Key Cryptanalysis II

  11. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on provable security; hash functions and signatures; side channel attacks; symmetric key cryptanalysis; key exchange and secret sharing; efficient implementation and hardware; and coding theory in cryptography.

Keywords

RSA authentication block ciphers linear cryptanalysis public-key cryptography

Editors and affiliations

  • Goutam Paul
    • 1
  • Serge Vaudenay
    • 2
  1. 1.R.C. Bose Centre for Cryptology and SecurityIndian Statistical InstituteKolkataIndia
  2. 2.EPFL - I&C - LASECLausanneSwitzerland

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-03515-4
  • Copyright Information Springer International Publishing Switzerland 2013
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-03514-7
  • Online ISBN 978-3-319-03515-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site