Progress in Cryptology - INDOCRYPT 2006

Progress in Cryptology - INDOCRYPT 2006

Author: Rana Barua

Publisher: Springer

Published: 2006-11-28

Total Pages: 466

ISBN-13: 3540497692

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006. The 29 revised full papers and 2 invited papers cover such topics as symmetric cryptography, provable security, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.


Progress in Cryptology – INDOCRYPT 2007

Progress in Cryptology – INDOCRYPT 2007

Author: Kannan Srinathan

Publisher: Springer Science & Business Media

Published: 2007-11-16

Total Pages: 437

ISBN-13: 3540770259

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The 22 revised full papers and 11 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers.


Progress in Cryptology - INDOCRYPT 2008

Progress in Cryptology - INDOCRYPT 2008

Author: Vincent Rijmen

Publisher: Springer

Published: 2008-11-25

Total Pages: 449

ISBN-13: 3540897542

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.


Progress in Cryptology - INDOCRYPT 2010

Progress in Cryptology - INDOCRYPT 2010

Author: Guang Gong

Publisher: Springer

Published: 2010-12-01

Total Pages: 376

ISBN-13: 3642174019

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 11th International Conference on Cryptology in India, INDOCRYPT 2010, held in Hyderabad, India, in December 2010. The 22 revised full papers were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on security of RSA and multivariate schemes; security analysis, pseudorandom permutations and applications; hash functions; attacks on block ciphers and stream ciphers; fast cryptographic computation; cryptanalysis of AES; and efficient implementation.


Progress in Cryptology - INDOCRYPT 2009

Progress in Cryptology - INDOCRYPT 2009

Author: Bimal Roy

Publisher: Springer Science & Business Media

Published: 2009-11-24

Total Pages: 456

ISBN-13: 3642106277

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009. The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.


Progress in Cryptology – INDOCRYPT 2017

Progress in Cryptology – INDOCRYPT 2017

Author: Arpita Patra

Publisher: Springer

Published: 2017-12-02

Total Pages: 416

ISBN-13: 3319716670

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017. The 19 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.


Progress in Cryptology - INDOCRYPT 2012

Progress in Cryptology - INDOCRYPT 2012

Author: Steven Galbraith

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 577

ISBN-13: 3642349315

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.


Progress in Cryptology - AFRICACRYPT 2008

Progress in Cryptology - AFRICACRYPT 2008

Author: Serge Vaudenay

Publisher: Springer Science & Business Media

Published: 2008-05-27

Total Pages: 425

ISBN-13: 3540681590

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008. The 25 revised full papers presented together with 2 invited papers were carefully selected during two rounds of reviewing and improvement from 82 submissions. The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.


Domain Specific High-Level Synthesis for Cryptographic Workloads

Domain Specific High-Level Synthesis for Cryptographic Workloads

Author: Ayesha Khalid

Publisher: Springer

Published: 2019-03-28

Total Pages: 254

ISBN-13: 9811010706

DOWNLOAD EBOOK

This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.