Progress in Cryptology - INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings

Progress in Cryptology - INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings


$97.56 $99.00 Save 1% Current price is $97.56, Original price is $99. You Save 1%.
Choose Expedited Shipping at checkout for guaranteed delivery by Thursday, September 19


This book constitutes the refereed proceedings of the 11th International Conference on Cryptology in India, INDOCRYPT 2010, held in Hyderabad, India, in December 2010. The 22 revised full papers were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on security of RSA and multivariate schemes; security analysis, pseudorandom permutations and applications; hash functions; attacks on block ciphers and stream ciphers; fast cryptographic computation; cryptanalysis of AES; and efficient implementation.

Product Details

ISBN-13: 9783642174001
Publisher: Springer Berlin Heidelberg
Publication date: 01/14/2011
Series: Lecture Notes in Computer Science , #6498
Edition description: 2010
Pages: 366
Product dimensions: 0.00(w) x 0.00(h) x 0.03(d)

Table of Contents

Invited Talk

Getting a Few Things Right and Many Things Wrong Neal Koblitz 1

Security of RSA and Multivariate Schemes

Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions Santanu Sarkar Sourav Sen Gupta Subhamoy Maitra 2

Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks Stanislav Bulygin Albrecht Petzoldt Johannes Buchmann 17

CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key Albrecht Petzoldt Stanislav Bulygin Johannes Buchmann 33

Security Analysis, Pseudorandom Permutations and Applications

Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols Sanjit Chatterjee Alfred Menezes Berkant Ustaoglu 49

Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations Avradip Mandal Jacques Patarin Valerie Nachef 69

The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants Mridul Nandi 82

Versatile Prêt á Voter: Handling Multiple Election Methods with a Unified Interface Zhe Xia Chris Culnane James Heather Hugo Jonker Peter Y.A. Ryan Steve Schneider Sriramkrishnan Srinivasan 98

Invited Talk

Cryptographic Hash Functions: Theory and Practice Bart Preneel 115

Hash Functions

Cryptanalysis of Tav-128 Hash Function Ashish Kumar Somitra Kumar Sanadhya Praveen Gauravaram Masoumeh Safkhani Majid Naderi 118

Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing Meltem Sönmez Turan Erdener Uyan 131

Speeding Up the Wide-Pipe: Secure and Fast Hashing Mridul Nandi Souradyuti Paul 144

Attacks on Block Ciphers and Stream Ciphers

New Boomerang Attacks on ARIA Ewan Fleischmann Christian Forler Michael Gorski Stefan Lucks 163

Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers Gregory V. Bard Nicolas T. Courtois Jorge Nakahara Jr. Pouyan Sepehrdad Bingsheng Zhang 176

The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA Cihangir Tezcan 197

Greedy Distinguishers and Nonrandomness Detectors Paul Stankovski 210

Fast Cryptographic Computation

Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity Sedat Akleylek Murat Cenk Ferruh Özbudak 227

Random Euclidean Addition Chain Generation and Its Application to Point Multiplication Fabien Herbaut Pierre-Yvan Liardet Nicolas Méloni Yannick Téglia Pascal Véron 238

Cryptanalysis of AES

Attack on a Higher-Order Masking of the AES Based on Homographic Functions Emmanuel Prouff Thomas Roche 262

Improved Impossible Differential Cryptanalysis of 7-Round AES-128 Hamid Mala Mohammad Dakhilalian Vincent Rijmen Mahmoud Modarres-Hashemi 282

Cryptanalysis of a Perturbated White-Box AES Implementation Yoni De Mulder Brecht Wyseur Bart Preneel 292

Efficient Implementation

A Program Generator for Intel AES-NI Instructions Raymond Manley David Gregg 311

ECC2K-130 on NVIDIA GPUs Daniel J. Bernstein Hsieh-Chung Chen Chen-Mou Cheng Tanja Lange Ruben Niederhagen Peter Schwabe Bo-Yin Yang 328

One Byte per Clock: A Novel RC4 Hardware Sourav Sen Gupta Koushik Sinha Subhamoy Maitra Bhabani P. Sinha 347

Author Index 365

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews