Progress in Cryptology - INDOCRYPT 2012

Progress in Cryptology - INDOCRYPT 2012 PDF Author: Steven Galbraith
Publisher: Springer Science & Business Media
ISBN: 3642349315
Category : Computers
Languages : en
Pages : 577

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Progress in Cryptology - INDOCRYPT 2012

Progress in Cryptology - INDOCRYPT 2012 PDF Author: Steven Galbraith
Publisher: Springer Science & Business Media
ISBN: 3642349315
Category : Computers
Languages : en
Pages : 577

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Progress in Cryptology - INDOCRYPT 2013

Progress in Cryptology - INDOCRYPT 2013 PDF Author: Goutam Paul
Publisher: Springer
ISBN: 3319035150
Category : Computers
Languages : en
Pages : 334

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on provable security; hash functions and signatures; side channel attacks; symmetric key cryptanalysis; key exchange and secret sharing; efficient implementation and hardware; and coding theory in cryptography.

Progress in Cryptology – INDOCRYPT 2017

Progress in Cryptology – INDOCRYPT 2017 PDF Author: Arpita Patra
Publisher: Springer
ISBN: 3319716670
Category : Computers
Languages : en
Pages : 416

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017. The 19 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.

Progress in Cryptology – INDOCRYPT 2023

Progress in Cryptology – INDOCRYPT 2023 PDF Author: Anupam Chattopadhyay
Publisher: Springer Nature
ISBN: 3031562321
Category :
Languages : en
Pages : 364

Get Book Here

Book Description


Progress in Cryptology - INDOCRYPT 2002

Progress in Cryptology - INDOCRYPT 2002 PDF Author: Alfred Menezes
Publisher: Springer Science & Business Media
ISBN: 3540002634
Category : Business & Economics
Languages : en
Pages : 449

Get Book Here

Book Description
This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new public-key schemes, foundations, public-key infrastructures, fingerprinting and watermarking, public-key protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer.

Progress in Cryptology - AFRICACRYPT 2024

Progress in Cryptology - AFRICACRYPT 2024 PDF Author: Serge Vaudenay
Publisher: Springer Nature
ISBN: 303164381X
Category :
Languages : en
Pages : 457

Get Book Here

Book Description


Advances in Cryptology – EUROCRYPT 2016

Advances in Cryptology – EUROCRYPT 2016 PDF Author: Marc Fischlin
Publisher: Springer
ISBN: 3662498960
Category : Computers
Languages : en
Pages : 931

Get Book Here

Book Description
The two-volume proceedings LNCS 9665 + 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowledge; pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leakage; in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.

Multidisciplinary Perspectives in Cryptology and Information Security

Multidisciplinary Perspectives in Cryptology and Information Security PDF Author: Sadkhan Al Maliky, Sattar B.
Publisher: IGI Global
ISBN: 1466658096
Category : Computers
Languages : en
Pages : 463

Get Book Here

Book Description
With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT professionals, cryptologists, and researchers in the field.

Guide to Pairing-Based Cryptography

Guide to Pairing-Based Cryptography PDF Author: Nadia El Mrabet
Publisher: CRC Press
ISBN: 1498729517
Category : Computers
Languages : en
Pages : 410

Get Book Here

Book Description
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.

Classical and Physical Security of Symmetric Key Cryptographic Algorithms

Classical and Physical Security of Symmetric Key Cryptographic Algorithms PDF Author: Anubhab Baksi
Publisher: Springer Nature
ISBN: 9811665222
Category : Technology & Engineering
Languages : en
Pages : 295

Get Book Here

Book Description
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular, it highlights the recent developments in tool-assisted analysis of ciphers. Furthermore, promising device-dependent attacks, such as fault attack and side channel attacks on symmetric key ciphers, are discussed in detail. One salient feature of this book is to present a detailed analysis of various fault countermeasures. The coverage of our book is quite diverse—it ranges from prerequisite information, latest research contribution as well as future research directions. It caters to students and researchers working in the field of cryptography.