Advertisement

Progress in Cryptology - INDOCRYPT 2008

9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

  • Dipanwita Roy Chowdhury
  • Vincent Rijmen
  • Abhijit Das

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5365)

Table of contents

  1. Front Matter
  2. Stream Ciphers

    1. Deike Priemuth-Schmid, Alex Biryukov
      Pages 1-14
    2. Mete Akgün, Pınar Kavak, Hüseyin Demirci
      Pages 40-52
  3. Cryptographic Hash Functions

    1. Dmitry Khovratovich
      Pages 53-66
    2. Jean-Philippe Aumasson
      Pages 67-77
    3. Jiří Vábek, Daniel Joščák, Milan Boháček, Jiří Tůma
      Pages 78-90
    4. Somitra Kumar Sanadhya, Palash Sarkar
      Pages 91-103
  4. Public-Key Cryptography – I

  5. Security Protocols

    1. Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff
      Pages 158-171
    2. Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 185-199
    3. Sébastien Canard, Amandine Jambert
      Pages 213-225
  6. Hardware Attacks

    1. Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay
      Pages 226-238
    2. Michal Hojsík, Bohuslav Rudolf
      Pages 239-250
    3. Andrey Bogdanov, Ilya Kizhvatov, Andrey Pyshkin
      Pages 251-265
  7. Block Ciphers

    1. Michael Gorski, Stefan Lucks
      Pages 266-278
    2. Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim
      Pages 279-293
    3. Orhun Kara
      Pages 294-307
    4. Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller
      Pages 308-321
    5. Daniel J. Bernstein, Peter Schwabe
      Pages 322-336
  8. Public-Key Cryptography – II

    1. Subhamoy Maitra, Santanu Sarkar
      Pages 337-349
  9. Cryptographic Hardware

    1. Chester Rebeiro, Debdeep Mukhopadhyay
      Pages 376-388
  10. Elliptic Curve Cryptography

    1. Gaetan Bisson, Takakazu Satoh
      Pages 389-399
    2. Sorina Ionica, Antoine Joux
      Pages 400-413
  11. Threshold Cryptography

    1. Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
      Pages 426-436
  12. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008.

The 33 revised full papers  were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.

Keywords

AES access control anonymity authentication bilinear maps biometrics block cipher cryptanalysis cryptographic attacks cryptography cryptology cryptosystems data security didgital signature schemes elliptic curve cryptography encryption sche

Editors and affiliations

  • Dipanwita Roy Chowdhury
    • 1
  • Vincent Rijmen
    • 2
  • Abhijit Das
    • 3
  1. 1.Dept. of Computer Science and EngineeringIndian Institute of TechnologyKharagpurIndia
  2. 2.K.U. Leuven, ESAT/COSIC KasteelparkLeuven-HeverleeBelgium
  3. 3.Department of Computer Science and EngineeringIndian Institute of TechnologyKharagpurIndia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-89754-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-89753-8
  • Online ISBN 978-3-540-89754-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site