Progress in Cryptology – INDOCRYPT 2011: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Author(s): Roger Dingledine (auth.), Daniel J. Bernstein, Sanjit Chatterjee (eds.)
Series: Lecture Notes in Computer Science 7107 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2011

Language: English
Pages: 401
City: Berlin Heidelberg
Tags: Data Encryption; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Systems and Data Security; Discrete Mathematics in Computer Science

Front Matter....Pages -
Tor and the Censorship Arms Race: Lessons Learned....Pages 1-1
Elliptic Curves for Applications....Pages 2-2
PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology....Pages 3-21
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks....Pages 22-39
Square Always Exponentiation....Pages 40-57
An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines....Pages 58-75
Partial Key Exposure: Generalized Framework to Attack RSA....Pages 76-92
The Yin and Yang Sides of Embedded Security....Pages 93-93
Mars Attacks! Revisited:....Pages 94-113
Linear Cryptanalysis of PRINTcipher  – Trails and Samples Everywhere....Pages 114-133
Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN....Pages 134-145
On Related-Key Attacks and KASUMI: The Case of A5/3....Pages 146-159
Cryptology: Where Is the New Frontier?....Pages 160-160
Analysis of the Parallel Distinguished Point Tradeoff....Pages 161-180
On the Evolution of GGHN Cipher....Pages 181-195
HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers....Pages 196-215
Addressing Flaws in RFID Authentication Protocols....Pages 216-235
Practical Analysis of Reduced-Round Keccak ....Pages 236-254
Boomerang Distinguisher for the SIMD-512 Compression Function....Pages 255-269
Lightweight Implementations of SHA-3 Candidates on FPGAs....Pages 270-289
Publicly Verifiable Secret Sharing for Cloud-Based Key Management....Pages 290-309
On Constructing Families of Pairing-Friendly Elliptic Curves with Variable Discriminant....Pages 310-319
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings....Pages 320-342
Stone Knives and Bear Skins: Why Does the Internet Run on Pre-historic Cryptography?....Pages 343-343
The Limits of Common Coins: Further Results....Pages 344-358
Secure Message Transmission in Asynchronous Directed Graphs....Pages 359-378
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy....Pages 379-398
Software Optimizations for Cryptographic Primitives on General Purpose x86_64 Platforms....Pages 399-400
Back Matter....Pages -