


default search action
INDOCRYPT 2007: Chennai, India
- K. Srinathan, C. Pandu Rangan, Moti Yung:

Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings. Lecture Notes in Computer Science 4859, Springer 2007, ISBN 978-3-540-77025-1
Hashing
- Markku-Juhani Olavi Saarinen

:
Linearization Attacks Against Syndrome Based Hashes. 1-9 - Markku-Juhani Olavi Saarinen

:
A Meet-in-the-Middle Collision Attack Against the New FORK-256. 10-17 - Kan Yasuda:

Multilane HMAC - Security beyond the Birthday Limit. 18-32
Elliptic Curve
- David Jao

, Dimitar Jetchev, Ramarathnam Venkatesan:
On the Bits of Elliptic Curve Diffie-Hellman Keys. 33-47 - V. N. Muralidhara, Sandeep Sen:

A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography. 48-57
Cryptoanalysis
- Gautham Sekar, Souradyuti Paul, Bart Preneel:

Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. 58-72 - Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng:

Related-Key Differential-Linear Attacks on Reduced AES-192. 73-85 - Orr Dunkelman, Gautham Sekar, Bart Preneel:

Improved Meet-in-the-Middle Attacks on Reduced-Round DES. 86-100
Information Theoretic Security
- Kannan Srinathan, Arpita Patra, Ashish Choudhary

, C. Pandu Rangan:
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. 101-122 - Shlomi Dolev, Limor Lahiani, Moti Yung:

Secret Swarm UnitReactive k-Secret Sharing. 123-137
Elliptic Curve Cryptography
- Hüseyin Hisil

, Gary Carter, Ed Dawson:
New Formulae for Efficient Elliptic Curve Arithmetic. 138-151 - Pradeep Kumar Mishra, Vassil S. Dimitrov:

A Graph Theoretic Analysis of Double Base Number Systems. 152-166 - Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters:

Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication. 167-182
Signature
- Licheng Wang, Zhenfu Cao

, Shihui Zheng, Xiaofang Huang, Yixian Yang:
Transitive Signatures from Braid Groups. 183-196 - Jun Shao, Zhenfu Cao

, Licheng Wang, Xiaohui Liang
:
Proxy Re-signature Schemes Without Random Oracles. 197-209
Side Channel Attack
- Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois:

First-Order Differential Power Analysis on the Duplication Method. 210-223 - K. Gopalakrishnan, Nicolas Thériault

, Chui Zhi Yao:
Solving Discrete Logarithms from Partial Knowledge of the Key. 224-237
Symmetric Cryptosystem
- Wen Ji, Lei Hu:

New Description of SMS4 by an Embedding overGF(28). 238-251 - Kazuhiko Minematsu, Toshiyasu Matsushima:

Tweakable Enciphering Schemes from Hash-Sum-Expansion. 252-267 - Håkan Englund, Thomas Johansson

, Meltem Sönmez Turan:
A Framework for Chosen IV Statistical Analysis of Stream Ciphers. 268-281
Asymmetric Cryptosystem
- Giovanni Di Crescenzo, Vishal Saraswat

:
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. 282-296 - Lihua Wang

, Jun Shao, Zhenfu Cao
, Masahiro Mambo, Akihiro Yamamura
:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. 297-311
Short Presentation
- Muxiang Zhang:

Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues. 312-321 - Ramakanth Kavuluru

, Andrew Klapper:
On the k -Operation Linear Complexity of Periodic Sequences. 322-330 - Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai:

Trade-Off Traitor Tracing. 331-340 - François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier:

X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. 341-350 - Rana Barua, Sumit Kumar Pandey

, Ravi Pankaj:
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System. 351-360 - Duo Lei, Chao Li:

Extended Multi-Property-Preserving and ECM-Construction. 361-372 - Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:

Design of a Differential Power Analysis Resistant Masked AES S-Box. 373-383 - Sanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan:

LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. 384-392 - Praveen Gauravaram

, Katsuyuki Okeya:
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. 393-403 - Frédéric Didier:

Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function. 404-413 - Cuauhtemoc Mancillas-López, Debrup Chakraborty

, Francisco Rodríguez-Henríquez:
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. 414-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














