|
Accepted papers
The following submissions (in alphabetical order by author name)
have been accepted to Indocrypt 2011:
- Shashank Agrawal, Abhinav Mehta, Kannan Srinathan: Secure message transmission in asynchronous directed graphs
- Martin Ågren, Thomas Johansson: Linear cryptanalysis of PRINTcipher—trails and samples everywhere
- Jean-Philippe Aumasson, María Naya-Plasencia, Markku-Juhani O. Saarinen: Practical attack on 8 rounds of the lightweight block cipher KLEIN
- Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar: On the evolution of GGHN cipher
- Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Rousselet, Vincent Verneuil: Square always exponentiation
- Craig Costello, Kristin Lauter, Michael Naehrig: Attractive subfamilies of BLS curves for implementing high-security pairings
- Robert Dryło: On constructing families of pairing-friendly elliptic curves with variable discriminant
- Roy D'Souza, David Jao, Ilya Mironov, Omkant Pandey: Publicly verifiable secret sharing for cloud-based key management
- Michael Gorski, Thomas Knapke, Eik List, Stefan Lucks, Jakob Wenzel: Mars Attacks! revisited
- Mohammad Hassan Habibi, Mohammad Reza Aref, Di Ma: Addressing flaws in RFID authentication protocols
- Jin Hong, Ga Won Lee, Daegun Ma: Analysis of the parallel distinguished point tradeoff
- Jens-Peter Kaps, Panasayya Yalla, Kishore Kumar Surapathi, Bilal Habib, Susheel Vadlamudi, Smriti Gurung, John Pham: Lightweight implementations of SHA-3 candidates on FPGAs
- Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Gonzalez Nieto: Towards provably secure DoS-resilient key exchange protocol with perfect forward secrecy
- Hemanta K. Maji, Manoj Prabhakaran: The limits of common coins: further results
- Florian Mendel, Tomislav Nad: Boomerang distinguisher for the SIMD-512 compression function
- Maxime Nassar, Sylvain Guilley, Jean-Luc Danger: Formal analysis of the entropy/security trade-off in first-order masking countermeasures against side-channel attacks
- María Naya-Plasencia, Andrea Röck, Willi Meier: Practical analysis of reduced-round Keccak
- Phuong Ha Nguyen, M.J.B. Robshaw, Huaxiong Wang: On related-key attacks and KASUMI: the case of A5/3
- Chester Rebeiro, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay: An enhanced differential cache attack on CLEFIA for large cache lines
- Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita RoyChowdhury: PKDPA: an enhanced probabilistic differential power attack methodology
- Santanu Sarkar: Partial key exposure: generalized framework to attack RSA
- Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid: HiPAcc-LTE: an integrated high performance accelerator for 3GPP LTE stream ciphers
Version
This is version 2011.10.03 of the accepted.html web page.
|