


default search action
20th INDOCRYPT 2019: Hyderabad, India
- Feng Hao, Sushmita Ruj, Sourav Sen Gupta

:
Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings. Lecture Notes in Computer Science 11898, Springer 2019, ISBN 978-3-030-35422-0
Constructions: Signatures and Filter Permutators
- Ward Beullens, Jean-Charles Faugère, Eliane Koussa, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret:

PKP-Based Signature Scheme. 3-22 - Thaís Bardini Idalino

, Lucia Moura
, Carlisle Adams:
Modification Tolerant Signature Schemes: Location and Correction. 23-44 - Sanjit Chatterjee, R. Kabaleeshwaran

:
Rerandomizable Signatures Under Standard Assumption. 45-67 - Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert

:
Improved Filter Permutators for Efficient FHE: Better Instances and Implementations. 68-91
Cryptanalysis: Symmetric Key Ciphers and Hash Functions
- Chandratop Chakraborty, Pranab Chakraborty, Subhamoy Maitra:

RC4: Non-randomness in the Index j and Some Results on Its Cycles. 95-114 - Mingjiang Huang, Liming Wang:

Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications. 115-138 - Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:

Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128. 139-159 - Abhishek Kesarwani

, Santanu Sarkar
, Ayineedi Venkateswarlu:
Some Cryptanalytic Results on TRIAD. 160-174 - Mahesh Sreekumar Rajasree

:
Cryptanalysis of Round-Reduced KECCAK Using Non-linear Structures. 175-192
Protocols: Blockchain, Secure Computation and Blind Coupon Mechanism
- Arijit Dutta, Arnab Jana

, Saravanan Vijayakumaran:
Nummatus: A Privacy Preserving Proof of Reserves Protocol for Quisquis. 195-215 - Sibi Raj B. Pillai, Manoj Prabhakaran, Vinod M. Prabhakaran

, Srivatsan Sridhar
:
Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure Computation. 216-226 - Dragos Rotaru, Tim Wood:

MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security. 227-249 - Colin Boyd, Kristian Gjøsteen, Clémentine Gritti, Thomas Haines:

A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. 250-270
Theory: Oblivious Transfer, Obfuscation and Privacy Amplification
- Aditya Damodaran

, Maria Dubovitskaya, Alfredo Rial:
UC Priced Oblivious Transfer with Purchase Statistics and Dynamic Pricing. 273-296 - Dongxue Pan, Bei Liang

, Hongda Li, Peifang Ni:
Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications. 297-317 - Eshan Chattopadhyay, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu

, Sruthi Sekar:
Privacy Amplification from Non-malleable Codes. 318-337
Mathematics: Boolean Functions, Elliptic Curves and Lattices
- Deng Tang, Bimal Mandal, Subhamoy Maitra:

Vectorial Boolean Functions with Very Low Differential-Linear Uniformity Using Maiorana-McFarland Type Construction. 341-360 - Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha

:
On the Relationship Between Resilient Boolean Functions and Linear Branch Number of S-Boxes. 361-374 - Peter Schwabe, Amber Sprenkels

:
The Complete Cost of Cofactor h=1. 375-397 - Jun Xu, Santanu Sarkar

, Lei Hu:
Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction. 398-411
Quantum: Algorithms, Attacks and Key Distribution
- Debajyoti Bera, Subhamoy Maitra, SAPV Tharrmashastha:

Efficient Quantum Algorithms Related to Autocorrelation Spectrum. 415-432 - Boyu Ni, Gembu Ito, Xiaoyang Dong, Tetsu Iwata:

Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256. 433-455 - Jyotirmoy Basak

, Arpita Maitra, Subhamoy Maitra:
Device Independent Quantum Key Distribution Using Three-Party Pseudo-Telepathy. 456-471 - Arpita Maitra, Suvra Sekhar Das:

Generalized Approach for Analysing Quantum Key Distribution Experiments. 472-491
Hardware: Efficiency, Side-Channel Resistance and PUFs
- Jonathan Sönnerup, Martin Hell, Mattias Sönnerup, Ripudaman Khattar:

Efficient Hardware Implementations of Grain-128AEAD. 495-513 - Fatih Balli, Subhadeep Banik

:
Exploring Lightweight Efficiency of ForkAES. 514-534 - Timo Zijlstra, Karim Bigou

, Arnaud Tisserand
:
FPGA Implementation and Comparison of Protections Against SCAs for RLWE. 535-555 - Akhilesh Anilkumar Siddhanti, Srinivasu Bodapati, Anupam Chattopadhyay, Subhamoy Maitra, Dibyendu Roy, Pantelimon Stanica

:
Analysis of the Strict Avalanche Criterion in Variants of Arbiter-Based Physically Unclonable Functions. 556-577

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














