Progress in Cryptology - INDOCRYPT 2010

11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings

  • Guang Gong
  • Kishan Chand Gupta
Conference proceedings INDOCRYPT 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6498)

Table of contents

  1. Front Matter
  2. Invited Talk

  3. Security of RSA and Multivariate Schemes

    1. Santanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra
      Pages 2-16
    2. Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann
      Pages 17-32
    3. Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann
      Pages 33-48
  4. Security Analysis, Pseudorandom Permutations and Applications

    1. Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu
      Pages 49-68
    2. Avradip Mandal, Jacques Patarin, Valerie Nachef
      Pages 69-81
    3. Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve Schneider et al.
      Pages 98-114
  5. Invited Talk

  6. Hash Functions

    1. Ashish Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Masoumeh Safkhani, Majid Naderi
      Pages 118-130
    2. Mridul Nandi, Souradyuti Paul
      Pages 144-162
  7. Attacks on Block Ciphers and Stream Ciphers

    1. Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks
      Pages 163-175
    2. Gregory V. Bard, Nicolas T. Courtois, Jorge Nakahara Jr, Pouyan Sepehrdad, Bingsheng Zhang
      Pages 176-196
  8. Fast Cryptographic Computation

    1. Fabien Herbaut, Pierre-Yvan Liardet, Nicolas Méloni, Yannick Téglia, Pascal Véron
      Pages 238-261
  9. Cryptanalysis of AES

    1. Hamid Mala, Mohammad Dakhilalian, Vincent Rijmen, Mahmoud Modarres-Hashemi
      Pages 282-291
    2. Yoni De Mulder, Brecht Wyseur, Bart Preneel
      Pages 292-310
  10. Efficient Implementation

    1. Raymond Manley, David Gregg
      Pages 311-327
    2. Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe et al.
      Pages 328-346
    3. Sourav Sen Gupta, Koushik Sinha, Subhamoy Maitra, Bhabani P. Sinha
      Pages 347-363
  11. Back Matter

About these proceedings


AES AES-128 CUDA Hashing Permutation ants block ciphers boomerang attacks calculus complexity cryptanalysis hardware encryption hash function hash functions key exposure attack

Editors and affiliations

  • Guang Gong
    • 1
  • Kishan Chand Gupta
    • 2
  1. 1.Department of Electrical and Computer EngineeringUniversity of WaterlooWaterlooCanada
  2. 2.Indian Statistical InstituteApplied Statistics UnitKolkataIndia

Bibliographic information

Industry Sectors
Finance, Business & Banking
IT & Software