© 2015

Progress in Cryptology -- INDOCRYPT 2015

16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings

  • Alex Biryukov
  • Vipul Goyal
Conference proceedings INDOCRYPT 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9462)

Also part of the Security and Cryptology book sub series (LNSC, volume 9462)

Table of contents

  1. Front Matter
    Pages I-XX
  2. Public Key Encryption

    1. Front Matter
      Pages 1-1
    2. Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay
      Pages 25-44
    3. Haiyang Xue, Yamin Liu, Xianhui Lu, Bao Li
      Pages 64-84
    4. Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
      Pages 85-102
  3. Cryptanalysis

    1. Front Matter
      Pages 103-103
    2. Liqiang Peng, Lei Hu, Yao Lu, Santanu Sarkar, Jun Xu, Zhangjie Huang
      Pages 105-123
    3. Subhadeep Banik
      Pages 124-139
    4. Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram
      Pages 153-179
    5. Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya
      Pages 198-217
  4. Side Channel Attacks

    1. Front Matter
      Pages 239-239
    2. Subhadeep Banik, Andrey Bogdanov
      Pages 241-252
    3. Nasour Bagheri, Navid Ghaedi, Somitra Kumar Sanadhya
      Pages 253-269
    4. Sylvain Guilley, Annelie Heuser, Olivier Rioul
      Pages 270-290
  5. Information Theoretic Cryptography

    1. Front Matter
      Pages 291-291

About these proceedings


This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in India, INDOCRYPT 2015, held in Bangalore, India, in December 2015. The 19 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on public key encryption; cryptanalysis; side channel attacks; information theoretic cryptography; and lightweight cryptography.


Digital signatures Public key encryption Block and stream ciphers Hash functions and message authentication codes Cryptanalysis and other attacks Information-theoretic techniques Mathematical foundations of cryptography Authentication Malicious design modifications Side-channel analysis and countermeasures

Editors and affiliations

  • Alex Biryukov
    • 1
  • Vipul Goyal
    • 2
  1. 1.LuxembourgLuxembourg
  2. 2.Microsoft Research IndiaBangloreIndia

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking