


default search action
21st INDOCRYPT 2020: Bangalore, India
- Karthikeyan Bhargavan

, Elisabeth Oswald
, Manoj Prabhakaran:
Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings. Lecture Notes in Computer Science 12578, Springer 2020, ISBN 978-3-030-65276-0
Applications
- Krzysztof Pietrzak:

Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing. 3-15 - Leonard Kleinrock, Rafail Ostrovsky, Vassilis Zikas:

Proof-of-Reputation Blockchain with Nakamoto Fallback. 16-38 - Clément Hoffmann

, Pierrick Méaux, Thomas Ricosset:
Transciphering, Using FiLIP and TFHE for an Efficient Delegation of Computation. 39-61 - Archita Agarwal, Seny Kamara:

Encrypted Key-Value Stores. 62-85
Formal Methods
- Cheng Shi, Kazuki Yoneyama:

Formal Verification of Fair Exchange Based on Bitcoin Smart Contracts. 89-106 - José Bacelar Almeida

, Manuel Barbosa
, Gilles Barthe, Vincent Laporte, Tiago Oliveira
:
Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification. 107-127 - Damián Aparicio-Sánchez, Santiago Escobar

, Catherine Meadows, José Meseguer, Julia Sapiña
:
Protocol Analysis with Time. 128-150 - Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari

:
Verifpal: Cryptographic Protocol Analysis for the Real World. 151-202
Implementing Elliptic Curve Cryptography
- Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert

, Kostas Papagiannopoulos, Vincent Verneuil:
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices. 205-227 - Mojtaba Bisheh-Niasar

, Reza Azarderakhsh, Mehran Mozaffari Kermani
:
Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448. 228-247 - Abhraneel Dutta, Aaron Hutchinson, Koray Karabina:

Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography. 248-270
Ciphers and Cryptanalysis
- Liliya Kraleva

, Raluca Posteuca, Vincent Rijmen
:
Cryptanalysis of the Permutation Based Algorithm SpoC. 273-293 - Pranab Chakraborty, Subhamoy Maitra:

More Glimpses of the RC4 Internal State Array. 294-311 - Lorenzo Grassi

, Markus Schofnegger:
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box. 312-331 - Orr Dunkelman

, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya
:
Counting Active S-Boxes is not Enough. 332-344 - Maria Eichlseder

, Gregor Leander
, Shahram Rasoolzadeh
:
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers. 345-369
Quantum Cryptanalysis
- Carlos Cid, Akinori Hosoyamada, Yunwen Liu

, Siang Meng Sim:
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-Key Settings. 373-394 - Ravi Anand

, Arpita Maitra, Sourav Mukhopadhyay
:
Evaluation of Quantum Cryptanalysis on SPECK. 395-413
Learning with Errors
- Alessandro Budroni

, Qian Guo
, Thomas Johansson
, Erik Mårtensson
, Paul Stankovski Wagner:
Making the BKW Algorithm Practical for LWE. 417-439 - Thomas Espitau, Antoine Joux

, Natalia Kharchenko:
On a Dual/Hybrid Approach to Small Secret LWE - A Dual/Enumeration Technique for Learning with Errors and Application to Security Estimates of FHE Schemes. 440-462
Encryption and Signatures
- Pratyay Mukherjee:

Adaptively Secure Threshold Symmetric-Key Encryption. 465-487 - Martha Norberg Hovd, Martijn Stam:

Vetted Encryption. 488-507 - Juliane Krämer, Patrick Struck

:
Security of Public Key Encryption Against Resetting Attacks. 508-528 - Mihir Bellare, Wei Dai:

The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-rewinding Proofs for Schnorr Identification and Signatures. 529-552 - Olivier Blazy

, Saqib A. Kakvi
:
Skipping the q in Group Signatures. 553-575 - Vivek Arte, Mihir Bellare, Louiza Khati:

Incremental Cryptography Revisited: PRFs, Nonces and Modular Design. 576-598
Functional Encryption
- Nicholas Genise, Baiyu Li:

Gadget-Based iNTRU Lattice Trapdoors. 601-623 - Giang Linh Duc Nguyen, Willy Susilo

, Dung Hoang Duong, Huy Quoc Le
, Fuchun Guo
:
Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model. 624-643 - Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan:

Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts. 644-665 - Linru Zhang, Xiangning Wang, Yuechen Chen, Siu-Ming Yiu:

Adaptive-Secure Identity-Based Inner-Product Functional Encryption and Its Leakage-Resilience. 666-690 - Olivier Blazy, Sayantan Mukherjee

:
CCA-Secure ABE Using Tag and Pair Encoding. 691-714 - Pooya Farshim, Georg Fuchsbauer, Alain Passelègue:

Simpler Constructions of Asymmetric Primitives from Obfuscation. 715-738
Secure Multi-party Computation
- Zahra Jafargholi, Sabine Oechsner

:
Adaptive Security of Practical Garbling Schemes. 741-762 - Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura

:
Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials. 763-785 - Ashish Choudhury

, Nikhil Pappu
:
Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract). 786-809 - Ashish Choudhury

:
Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-party Computation. 810-831 - Ashish Choudhury

, Aditya Hegde
:
High Throughput Secure MPC over Small Population in Hybrid Networks (Extended Abstract). 832-855
Non-interactive Zero-Knowledge Proofs
- Vivek Arte, Mihir Bellare:

Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer. 859-881 - Kyosuke Yamashita

, Mehdi Tibouchi, Masayuki Abe:
On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret Equality. 882-904

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














