Indocrypt 2011, 11–14 December 2011, Chennai


Introduction
How to participate:
Schedule+slides
Tutorials
Travel
Registration
Photo
How to contribute:
Call for papers
Submission
Accepted papers

Accepted papers

The following submissions (in alphabetical order by author name) have been accepted to Indocrypt 2011:
  • Shashank Agrawal, Abhinav Mehta, Kannan Srinathan: Secure message transmission in asynchronous directed graphs
  • Martin Ågren, Thomas Johansson: Linear cryptanalysis of PRINTcipher—trails and samples everywhere
  • Jean-Philippe Aumasson, María Naya-Plasencia, Markku-Juhani O. Saarinen: Practical attack on 8 rounds of the lightweight block cipher KLEIN
  • Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar: On the evolution of GGHN cipher
  • Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Rousselet, Vincent Verneuil: Square always exponentiation
  • Craig Costello, Kristin Lauter, Michael Naehrig: Attractive subfamilies of BLS curves for implementing high-security pairings
  • Robert Dryło: On constructing families of pairing-friendly elliptic curves with variable discriminant
  • Roy D'Souza, David Jao, Ilya Mironov, Omkant Pandey: Publicly verifiable secret sharing for cloud-based key management
  • Michael Gorski, Thomas Knapke, Eik List, Stefan Lucks, Jakob Wenzel: Mars Attacks! revisited
  • Mohammad Hassan Habibi, Mohammad Reza Aref, Di Ma: Addressing flaws in RFID authentication protocols
  • Jin Hong, Ga Won Lee, Daegun Ma: Analysis of the parallel distinguished point tradeoff
  • Jens-Peter Kaps, Panasayya Yalla, Kishore Kumar Surapathi, Bilal Habib, Susheel Vadlamudi, Smriti Gurung, John Pham: Lightweight implementations of SHA-3 candidates on FPGAs
  • Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Gonzalez Nieto: Towards provably secure DoS-resilient key exchange protocol with perfect forward secrecy
  • Hemanta K. Maji, Manoj Prabhakaran: The limits of common coins: further results
  • Florian Mendel, Tomislav Nad: Boomerang distinguisher for the SIMD-512 compression function
  • Maxime Nassar, Sylvain Guilley, Jean-Luc Danger: Formal analysis of the entropy/security trade-off in first-order masking countermeasures against side-channel attacks
  • María Naya-Plasencia, Andrea Röck, Willi Meier: Practical analysis of reduced-round Keccak
  • Phuong Ha Nguyen, M.J.B. Robshaw, Huaxiong Wang: On related-key attacks and KASUMI: the case of A5/3
  • Chester Rebeiro, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay: An enhanced differential cache attack on CLEFIA for large cache lines
  • Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury: PKDPA: an enhanced probabilistic differential power attack methodology
  • Santanu Sarkar: Partial key exposure: generalized framework to attack RSA
  • Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid: HiPAcc-LTE: an integrated high performance accelerator for 3GPP LTE stream ciphers

Version

This is version 2011.10.03 of the accepted.html web page.