Indocrypt

Known as: International Conference on Cryptology in India 
Indocrypt (also INDOCRYPT) is an annual international cryptography conference held each December since 2000 in India. The conference proceedings are… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2000-2016
02420002016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Function Secret Sharing (FSS) and Homomorphic Secret Sharing (HSS) are two extensions of standard secret sharing, which support… (More)
Is this relevant?
Review
2016
Review
2016
Side-channel analysis is an important concern for the security of cryptographic implementations, and may lead to powerful key… (More)
  • figure 7
  • figure 8
  • table 4
  • table 5
  • table 6
Is this relevant?
2015
2015
s of Invited Talks On Randomness, Codes and Extractors in Cryptography 
Is this relevant?
2014
2014
This extended abstract briefly summarizes a talk with the same title and gives literature pointers. In particular, we discuss… (More)
  • figure 2,3
  • figure 8
  • table 7
  • table 8
  • table 9
Is this relevant?
2013
2013
Recently an advanced class of encryption systems, functional encryption (FE), formalized by Boneh, Sahai and Waters [TCC’11] and… (More)
Is this relevant?
2008
2008
Multi-receiver Identity-Based Key Encapsulation Mechanism (mIB-KEM) allows a sender to distribute messages for a set of receivers… (More)
  • table 1
Is this relevant?
Review
2003
Review
2003
We present a survey of recent work on the linear complexity, the linear complexity profile, and the k-error linear complexity of… (More)
Is this relevant?
Review
2002
Review
2002
The wide trail design strategy claims to design ciphers that are both efficient and secure against linear and differential… (More)
Is this relevant?
2001
2001
Most last-round attacks on iterated block ciphers provide some design criteria for the round function. Here, we focus on the… (More)
Is this relevant?
2000
2000
The correlation of a Boolean function with its variables is closely related to the correlation attack on stream cipher. The Walsh… (More)
  • table 4
  • table 5
  • figure 4
  • figure 5
  • figure 6
Is this relevant?