Progress in Cryptology - INDOCRYPT 2009

10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings

  • Bimal Roy
  • Nicolas Sendrier
Conference proceedings INDOCRYPT 2009
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5922)

Table of contents

  1. Front Matter
  2. Post-Quantum Cryptology

    1. Johannes Buchmann, Richard Lindner
      Pages 1-17
    2. Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe
      Pages 18-38
  3. Key Agreement Protocols

    1. Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu
      Pages 39-56
  4. Side Channel Attacks

    1. Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin
      Pages 72-87
    2. Julien Bringer, Hervé Chabanne, Thomas Icart
      Pages 88-103
    3. Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga
      Pages 104-118
  5. Symmetric Cryptology

    1. Thierry P. Berger, Marine Minier, Benjamin Pousse
      Pages 119-135
    2. Sumanta Sarkar
      Pages 136-143
    3. Hüseyin Demirci, İhsan Taşkın, Mustafa Çoban, Adnan Baysal
      Pages 144-156
  6. Hash Functions

    1. Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 157-168
    2. Kota Ideguchi, Dai Watanabe
      Pages 169-181
    3. Zheng Gong, Pieter Hartel, Svetla Nikova, Bo Zhu
      Pages 182-198
    4. Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi
      Pages 199-218
    5. Florian Mendel, Tomislav Nad
      Pages 219-232
  7. Number Theoretic Cryptology

  8. Lightweight Cryptology

    1. Julien Bringer, Hervé Chabanne, Gérard Cohen, Bruno Kindarji
      Pages 272-289

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.

The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.

Keywords

AES MSP 430 SHA-3 SHAMATA-512 SWIFFT algorithms body sensors calculus cryptography encryption hash function hash functions preimage attack quadratic residues signatures

Editors and affiliations

  • Bimal Roy
    • 1
  • Nicolas Sendrier
    • 2
  1. 1.Applied Statistics UnitIndian Statistical InstituteKolkataIndia
  2. 2.Projet Team SECRETCentre de Recherche INRIA RocquencourtLe Chesnay CedexFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-10628-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-10627-9
  • Online ISBN 978-3-642-10628-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349