Normal view MARC view ISBD view

Progress in Cryptology - INDOCRYPT 2021 [electronic resource] : 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings / edited by Avishek Adhikari, Ralf Küsters, Bart Preneel.

Contributor(s): Adhikari, Avishek [editor.] | Küsters, Ralf [editor.] | Preneel, Bart [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 13143Publisher: Cham : Springer International Publishing : Imprint: Springer, 2021Edition: 1st ed. 2021.Description: XIX, 634 p. 130 illus., 51 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030925185.Subject(s): Cryptography | Data encryption (Computer science) | Coding theory | Information theory | Software engineering | Computer networks  | Data protection | Cryptology | Coding and Information Theory | Software Engineering | Computer Communication Networks | Security ServicesAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
Authenticated Encryption -- Revisiting the Security of COMET Authenticated Encryption Scheme -- tHyENA: Making HyENA Even Smaller -- Panther: A Sponge Based Lightweight Authenticated Encryption Scheme -- Symmetric Cryptography -- Crooked Indifferentiability of Enveloped XOR Revisited -- Sequential Indifferentiability of Confusion-Diffusion Networks -- Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher -- Lightweight Cryptography -- Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm -- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes -- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks -- Side-Channel Attacks -- Analyzing Masked Ciphers Against Transition and Coupling Effects -- A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks -- Improving First-Order Threshold Implementations of SKINNY -- Fault Attacks -- Differential Fault Attackon Espresso -- Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization -- Fault-Enabled Chosen-Ciphertext Attacks on Kyber -- Post-Quantum Cryptography -- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting -- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures -- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting -- Public Key Encryption and Protocols -- Identity-Based Matchmaking Encryption without Random Oracles -- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain -- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE -- Cryptographic Constructions -- Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy -- Smooth Zero-Knowledge Hash Functions -- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation -- Blockchains -- On Elapsed Time Consensus Protocols -- Time-release Cryptography from Minimal Circuit Assumptions -- Succinct Publicly-Certifiable Proofs (or, Can a Blockchain Verify a Designated-Verifier Proof?).
In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021. The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.
    average rating: 0.0 (0 votes)
No physical items for this record

Authenticated Encryption -- Revisiting the Security of COMET Authenticated Encryption Scheme -- tHyENA: Making HyENA Even Smaller -- Panther: A Sponge Based Lightweight Authenticated Encryption Scheme -- Symmetric Cryptography -- Crooked Indifferentiability of Enveloped XOR Revisited -- Sequential Indifferentiability of Confusion-Diffusion Networks -- Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher -- Lightweight Cryptography -- Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm -- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight S-Boxes -- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover's Attacks -- Side-Channel Attacks -- Analyzing Masked Ciphers Against Transition and Coupling Effects -- A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks -- Improving First-Order Threshold Implementations of SKINNY -- Fault Attacks -- Differential Fault Attackon Espresso -- Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization -- Fault-Enabled Chosen-Ciphertext Attacks on Kyber -- Post-Quantum Cryptography -- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting -- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures -- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting -- Public Key Encryption and Protocols -- Identity-Based Matchmaking Encryption without Random Oracles -- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain -- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE -- Cryptographic Constructions -- Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy -- Smooth Zero-Knowledge Hash Functions -- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation -- Blockchains -- On Elapsed Time Consensus Protocols -- Time-release Cryptography from Minimal Circuit Assumptions -- Succinct Publicly-Certifiable Proofs (or, Can a Blockchain Verify a Designated-Verifier Proof?).

This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021. The 27 full papers included in these proceedings were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: authenticated encryption; symmetric cryptography; lightweight cryptography; side-channel attacks; fault attacks; post-quantum cryptography; public key encryption and protocols; cryptographic constructions; blockchains.

There are no comments for this item.

Log in to your account to post a comment.