Stop the war!
Остановите войну!
for scientists:
default search action
24th INDOCRYPT 2023: Goa, India - Part I
- Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14459, Springer 2024, ISBN 978-3-031-56231-0
Symmetric-Key Cryptography, Hash Functions, Authenticated Encryption Modes
- Koustabh Ghosh, Parisa Amiri-Eliasi, Joan Daemen:
Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and Cyclic Shift. 3-24 - Nilanjan Datta, Avijit Dutta, Eik List, Sougata Mandal:
On the Security of Triplex- and Multiplex-Type Constructions with Smaller Tweaks. 25-47 - Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:
From Substitution Box to Threshold. 48-67 - Nilanjan Datta, Avijit Dutta, Samir Kundu:
Tight Security Bound of $\textsf {2k{\text {-}}LightMAC\_Plus}$. 68-88 - Bishwajit Chakraborty, Nilanjan Datta, Mridul Nandi:
Designing Full-Rate Sponge Based AEAD Modes. 89-110 - Yuqing Zhao, Chun Guo:
Towards Minimizing Tweakable Blockcipher-Based Generalized Feistel Networks. 111-133 - Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert:
The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm. 134-156
Elliptic Curves, Zero-Knowledge Proof, Signatures
- Youcef Mokrani, David Jao:
Generating Supersingular Elliptic Curves over $\mathbb {F}_p$ with Unknown Endomorphism Ring. 159-174 - Sabyasachi Karati, Gourab Chandra Saha:
Kummer and Hessian Meet in the Field of Characteristic 2. 175-196 - R. Kabaleeshwaran, Panuganti Venkata Shanmukh Sai:
Synchronized Aggregate Signature Under Standard Assumption in the Random Oracle Model. 197-220 - Mingjie Chen, Yi-Fu Lai, Abel Laval, Laurane Marco, Christophe Petit:
Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits Based on Isogenies. 221-243
Attacks
- François Delobel, Patrick Derbez, Arthur Gontier, Loïc Rouquette, Christine Solnon:
A CP-Based Automatic Tool for Instantiating Truncated Differential Characteristics. 247-268 - Gregor Leander, Lukas Stennes, Jan Vorloeper:
Falling into Bytes and Pieces - Cryptanalysis of an Apple Patent Application. 269-286 - Arpita Maitra, Asmita Samanta, Subha Kar, Hirendra Kumar Garai, Mintu Mandal, Sabyasachi Dey:
Grover on Chosen IV Related Key Attack Against GRAIN-128a. 287-306 - Sreyosi Bhattacharyya, Palash Sarkar:
Concrete Time/Memory Trade-Offs in Generalised Stern's ISD Algorithm. 307-328 - Lukas Vlasak, Antoine Bouvet, Sylvain Guilley:
Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2. 329-349
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.