This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on provable security; hash functions and signatures; side channel attacks; symmetric key cryptanalysis; key exchange and secret sharing; efficient implementation and hardware; and coding theory in cryptography.
Author(s): Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang (auth.), Goutam Paul, Serge Vaudenay (eds.)
Series: Lecture Notes in Computer Science 8250 Security and Cryptology
Edition: 1
Publisher: Springer International Publishing
Year: 2013
Language: English
Pages: 319
Tags: Data Encryption; Systems and Data Security
Front Matter....Pages -
Key-Private Proxy Re-encryption under LWE....Pages 1-18
Breaking the ${\mathcal{O}}(n|C|)$ Barrier for Unconditionally Secure Asynchronous Multiparty Computation....Pages 19-37
Alternating Product Ciphers: A Case for Provable Security Comparisons....Pages 38-49
An Integral Distinguisher on Grøstl-512 v3....Pages 50-59
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes....Pages 60-77
Improved Scan-Chain Based Attacks and Related Countermeasures....Pages 78-97
Correlation Analysis against Protected SFM Implementations of RSA....Pages 98-115
Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis....Pages 116-135
Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN....Pages 136-148
Improbable Differential from Impossible Differential: On the Validity of the Model....Pages 149-160
Compact Authenticated Key Exchange from Bounded CCA-Secure KEM....Pages 161-178
On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection....Pages 179-196
There’s Something about m -ary....Pages 197-214
On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective....Pages 215-226
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors....Pages 227-243
8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors....Pages 244-261
Accelerating Sorting of Fully Homomorphic Encrypted Data....Pages 262-273
Construction of Recursive MDS Diffusion Layers from Gabidulin Codes....Pages 274-285
Polynomial Structures in Code-Based Cryptography....Pages 286-296
Security Analysis of the RC4+ Stream Cipher....Pages 297-307
On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible Differentials....Pages 308-318
Back Matter....Pages -