Progress in Cryptology - INDOCRYPT 2011

Progress in Cryptology - INDOCRYPT 2011
Author: Daniel J. Bernstein
Publisher: Springer Science & Business Media
Total Pages: 412
Release: 2011-11-21
Genre: Computers
ISBN: 3642255779

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Progress in Cryptology - INDOCRYPT 2011

Progress in Cryptology - INDOCRYPT 2011
Author: Daniel J. Bernstein
Publisher: Springer
Total Pages: 412
Release: 2011-12-07
Genre: Computers
ISBN: 3642255787

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Progress in Cryptology – INDOCRYPT 2019

Progress in Cryptology – INDOCRYPT 2019
Author: Feng Hao
Publisher: Springer Nature
Total Pages: 589
Release: 2019-12-09
Genre: Computers
ISBN: 3030354237

This book constitutes the refereed proceedings of the 20th International Conference on Cryptology in India, INDOCRYPT 2019, held in Hyderabad, India, in December 2019. The 28 revised full papers presented in this book were carefully reviewed and selected from 110 submissions (of which 20 were either rejected without being reviewed or withdrawn before the deadline). The focus of the conference includes works on signatures and filter permutators; symmetric key ciphers and hash functions; blockchain, secure computation and blind coupon mechanism; oblivious transfer, obfuscation and privacy amplification; Boolean functions, elliptic curves and lattices; algorithms, attacks and distribution; and efficiency, side-channel resistance and PUFs.

Progress in Cryptology – INDOCRYPT 2018

Progress in Cryptology – INDOCRYPT 2018
Author: Debrup Chakraborty
Publisher: Springer
Total Pages: 406
Release: 2018-12-05
Genre: Computers
ISBN: 3030053784

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on outsourced computation and searchable encryption; symmetric key cryptography and format preserving encryption; fault attacks and Hash functions; post quantum cryptography; asymmetric key cryptography and cryptanalysis; symmetric key cryptanalysis; theory; and secure computations and protocols.

Progress in Cryptology - INDOCRYPT 2011

Progress in Cryptology - INDOCRYPT 2011
Author: Daniel J. Bernstein
Publisher: Springer
Total Pages: 401
Release: 2012-02-24
Genre: Computers
ISBN: 9783642255793

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Cryptographic Obfuscation

Cryptographic Obfuscation
Author: Máté Horváth
Publisher: Springer Nature
Total Pages: 107
Release: 2020-10-05
Genre: Computers
ISBN: 3319980416

This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.

Advances in Cryptology – EUROCRYPT 2022

Advances in Cryptology – EUROCRYPT 2022
Author: Orr Dunkelman
Publisher: Springer Nature
Total Pages: 842
Release: 2022-05-27
Genre: Computers
ISBN: 3031069447

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May – 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic Primitives; Real-World Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks and Masking, Post-Quantum Cryptography; Information-Theoretic Security.

Advances in Cryptology – EUROCRYPT 2015

Advances in Cryptology – EUROCRYPT 2015
Author: Elisabeth Oswald
Publisher: Springer
Total Pages: 814
Release: 2015-04-13
Genre: Computers
ISBN: 366246800X

The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.