Progress in Cryptology – INDOCRYPT 2016

17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings

  • Orr Dunkelman
  • Somitra Kumar Sanadhya
Conference proceedings INDOCRYPT 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10095)

Also part of the Security and Cryptology book sub series (LNSC, volume 10095)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Public-Key Cryptography

    1. Front Matter
      Pages 1-1
    2. Louis Goubin, Francisco José Vial Prado
      Pages 3-24
    3. Yamin Liu, Xianhui Lu, Bao Li, Wenpan Jing, Fuyang Fang
      Pages 25-42
    4. Neetu Sharma, Rajeev Anand Sahu, Vishal Saraswat, Birendra Kumar Sharma
      Pages 43-60
    5. Mohamed Saied Emam Mohamed, Albrecht Petzoldt
      Pages 61-77
  3. Cryptographic Protocols

    1. Front Matter
      Pages 79-79
    2. Lakshmi Kuppusamy, Jothi Rangasamy
      Pages 81-98
    3. Muhua Liu, Ying Wu, Rui Xue
      Pages 99-118
  4. Side-Channel Attacks

    1. Front Matter
      Pages 135-135
    2. Marios O. Choudary, Romain Poussier, François-Xavier Standaert
      Pages 137-152
  5. Implementation of Cryptographic Schemes

    1. Front Matter
      Pages 171-171
    2. Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
      Pages 173-190
    3. Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari-Kermani
      Pages 191-206
    4. Ekawat Homsirikamol, Kris Gaj
      Pages 207-224
  6. Functional Encryption

    1. Front Matter
      Pages 225-225
    2. Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, Kwangjo Kim
      Pages 248-265

About these proceedings


This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016. The 23 revised full papers presented in this book were carefully reviewed and selected from 84 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.


cloud computing cryptographic primitives elliptic curve cryptography formal methods and theory of security post quantum cryptography

Editors and affiliations

  • Orr Dunkelman
    • 1
  • Somitra Kumar Sanadhya
    • 2
  1. 1.University of Haifa HaifaIsrael
  2. 2.Indraprashtha Institute of Information Technology (IIIT-D)New DelhiIndia

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-49889-8
  • Online ISBN 978-3-319-49890-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book