10th International Conference on Cryptology in India
Indocrypt 2009
December 13 - 16, 2009, New Delhi, India
Tutorial Speakers
(to be held on Sunday December 13, 2009)- Willi Meier, FHNW, Switzerland
- Nicolas Sendrier, INRIA, France
Invited Speakers
- Dan Bernstein, University of Illinois at Chicago, USA
- Marc Girault, Orange Labs, France
- Thomas Johansson, Lund University, Sweden
Contributed Talks
Post-Quantum Cryptology
Secure Parameters for SWIFFT
FSBday: Implementing Wagner's generalized birthday attack against the round-1 SHA-3 candidate FSB
Key Agreement Protocols
REUSING STATIC KEYS IN KEY AGREEMENT PROTOCOLS
A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols
Side Channel Attacks
Differential Fault Analysis of Rabbit: Toward a Secret Key Leakage
On Physical Obfuscation of Cryptographic Algorithms
Cache Timing Attacks on CLEFIA
Symmetric Cryptology
Software oriented stream ciphers based upon FCSRs in diversified mode
On the Symmetric Negabent Boolean Functions
Improved Meet-in-the-Middle Attacks on AES
Hash Functions
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
Second Preimage Attack on SHAMATA-512
Towards Secure and Practical MACs for Body Sensor Networks
Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions
A distinguisher for the compression function of SIMD-512
Number Theoretic Cryptology
Sampling from Signed Quadratic Residues: RSA Group is Pseudofree
Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller
A New Hard-Core Predicate of Paillier's Trapdoor Function
Lightweight Cryptology
Private Interrogation of Devices via Identification Codes
RFID Distance Bounding Multistate Enhancement
Two Attacks against the Ff RFID Protocol
Signature Protocols
Efficient Constructions of Signcryption Schemes and Signcryption Composability
On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited)
Verifiably Encrypted Signatures from RSA without NIZKs
Identity Based Aggregate Signcryption Schemes
Multiparty Computation
Oblivious Multi-variate Polynomial Evaluation
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems