10th International Conference on Cryptology in India
Indocrypt 2009
December 13 - 16, 2009, New Delhi, India
Differential Fault Analysis of Rabbit: Toward a Secret Key Leakage
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
Software oriented stream ciphers based upon FCSRs in diversified mode
On Physical Obfuscation of Cryptographic Algorithms
Cache Timing Attacks on CLEFIA
Oblivious Multi-variate Polynomial Evaluation
Second Preimage Attack on SHAMATA-512
Private Interrogation of Devices via Identification Codes
Efficient Constructions of Signcryption Schemes and Signcryption Composability
Towards Secure and Practical MACs for Body Sensor Networks
RFID Distance Bounding Multistate Enhancement
Identity Based Aggregate Signcryption Schemes
Sampling from Signed Quadratic Residues: RSA Group is Pseudofree
Secure Parameters for SWIFFT
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience
REUSING STATIC KEYS IN KEY AGREEMENT PROTOCOLS
On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited)
Verifiably Encrypted Signatures from RSA without NIZKs
FSBday: Implementing Wagner's generalized birthday attack against the round-1 SHA-3 candidate FSB
A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols
Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions
Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller
A New Hard-Core Predicate of Paillier's Trapdoor Function
Two Attacks against the Ff RFID Protocol
On the Symmetric Negabent Boolean Functions
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems
A distinguisher for the compression function of SIMD-512
Improved Meet-in-the-Middle Attacks on AES