default search action
INDOCRYPT 2018: New Delhi, India
- Debrup Chakraborty, Tetsu Iwata:
Progress in Cryptology - INDOCRYPT 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11356, Springer 2018, ISBN 978-3-030-05377-2
Outsourced Computation and Searchable Encryption
- Jothi Rangasamy, Lakshmi Kuppusamy:
Revisiting Single-Server Algorithms for Outsourcing Modular Exponentiation. 3-20 - Sanjit Chatterjee, Sayantan Mukherjee:
Keyword Search Meets Membership Testing: Adaptive Security from SXDH. 21-43
Symmetric Key Cryptography and Format Preserving Encryption
- Avijit Dutta, Mridul Nandi:
Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme. 47-69 - Francesco Berti, Olivier Pereira, Thomas Peters:
Reconsidering Generic Composition: The Tag-then-Encrypt Case. 70-90 - Rana Barua, Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray:
On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited. 91-104
Fault Attacks and Hash Functions
- Ravi Anand, Akhilesh Siddhanti, Subhamoy Maitra, Sourav Mukhopadhyay:
Differential Fault Attack on SIMON with Very Few Faults. 107-119 - Rajendra Kumar, Nikhil Mittal, Shashank Singh:
Cryptanalysis of 2 Round Keccak-384. 120-133
Post Quantum Cryptography
- Michael Meyer, Steffen Reith:
A Faster Way to the CSIDH. 137-152 - Jean-François Biasse, Annamaria Iezzi, Michael J. Jacobson Jr.:
A Note on the Security of CSIDH. 153-168 - Aaron Hutchinson, Koray Karabina:
Constructing Canonical Strategies for Parallel Implementation of Isogeny Based Cryptography. 169-189 - Hart Montgomery:
More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers. 190-211
Asymmetric Key Cryptography and Cryptanalysis
- Ayan Mahalanobis, Vivek Mohan Mallick, Ansari Abdullah:
A Las Vegas Algorithm to Solve the Elliptic Curve Discrete Logarithm Problem. 215-227 - Chitchanok Chuengsatiansup, Chloe Martindale:
Pairing-Friendly Twisted Hessian Curves. 228-247 - Giuseppe Ateniese, Katharina Fech, Bernardo Magri:
A Family of FDH Signature Schemes Based on the Quadratic Residuosity Assumption. 248-262
Symmetric Key Cryptanalysis
- Mahdi Sajadieh, Mohammad Vaziri:
Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism. 265-281 - Subhamoy Maitra, Bimal Mandal, Thor Martinsen, Dibyendu Roy, Pantelimon Stanica:
Tools in Analyzing Linear Approximation for Boolean Functions Related to FLIP. 282-303
Theory
- Divya Gupta, Hemanta K. Maji, Mingyuan Wang:
Non-malleable Codes Against Lookahead Tampering. 307-328 - Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Pratyay Mukherjee:
Obfuscation from Low Noise Multilinear Maps. 329-352
Secure Computations and Protocols
- Yu Ishimaki, Hayato Yamana:
Non-Interactive and Fully Output Expressive Private Comparison. 355-374 - Alexander R. Block, Hemanta K. Maji, Hai H. Nguyen:
Secure Computation with Constant Communication Overhead Using Multiplication Embeddings. 375-398
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.