Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,324,696 papers from all fields of science
Search
Sign In
Create Free Account
Indocrypt
Known as:
International Conference on Cryptology in India
Indocrypt (also INDOCRYPT) is an annual international cryptography conference held each December since 2000 in India. The conference proceedings are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Cryptography
Cryptology Research Society of India
Differential equations of addition
Jennifer Seberry
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Differential Fault Attack on SIMON with Very Few Faults
Ravi Anand
,
A. Siddhanti
,
S. Maitra
,
S. Mukhopadhyay
International Conference on Cryptology in India
2018
Corpus ID: 54447661
SIMON, a block cipher proposed by NSA (2013), has received a lot of attention from the cryptology community. Several…
Expand
2017
2017
Progress in Cryptology – INDOCRYPT 2017
T. Kleinjung
,
A. Lenstra
,
D. Page
,
N. Smart
Lecture Notes in Computer Science
2017
Corpus ID: 22124234
Function Secret Sharing (FSS) and Homomorphic Secret Sharing (HSS) are two extensions of standard secret sharing, which support…
Expand
2013
2013
Formal Verification of Voting and Auction Protocols : From Privacy to Fairness and Verifiability
Jannik Dreier
2013
Corpus ID: 167157938
In this document, we formally analyze security in electronic voting and electronic auctions. On-line voting over is now available…
Expand
2011
2011
Proceedings of the 12th international conference on Cryptology in India
D. Bernstein
,
S. Chatterjee
2011
Corpus ID: 62268603
2008
2008
On the Provable Security of Multi-Receiver Signcryption Schemes
S. D. Selvi
,
S. Vivek
,
R. Gopalakrishnan
,
Naga Naresh Karuturi
,
C. Rangan
IACR Cryptology ePrint Archive
2008
Corpus ID: 15749468
In ATC 2007, an identity based signcryption scheme for multiple receivers was proposed by Yu et al. In this paper, we first show…
Expand
2007
2007
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Markku-Juhani O. Saarinen
IACR Cryptology ePrint Archive
2007
Corpus ID: 14898923
We show that a 2112.9 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to…
Expand
Review
2006
Review
2006
Short 2-Move Undeniable Signatures
Jean Monnerat
,
S. Vaudenay
International Conference on Cryptology in Vietnam
2006
Corpus ID: 10219018
Attempting to reach a minimal number of moves in cryptographic protocols is a quite classical issue. Besides the theoretical…
Expand
2005
2005
On the Security of a Certified E-Mail Scheme with Temporal Authentication
Min-Hua Shao
,
Jianying Zhou
,
Guilin Wang
Communication Systems and Applications
2005
Corpus ID: 17370273
Certified e-mail is a value-added service for standard e-mail systems, in which the intended recipient gets the mail content if…
Expand
2003
2003
Identity-Based Broadcasting
Y. Mu
,
W. Susilo
,
Yan-Xia Lin
International Conference on Cryptology in India
2003
Corpus ID: 7410598
In this paper, we introduce a new concept called “Identity-Based Broadcasting Encryption” (IBBE), which can be applied to dynamic…
Expand
Review
2002
Review
2002
Progress in Cryptology — INDOCRYPT 2002
A. Menezes
,
P. Sarkar
Lecture Notes in Computer Science
2002
Corpus ID: 13362644
The wide trail design strategy claims to design ciphers that are both efficient and secure against linear and differential…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE