LEADER 04108nam 22006735 450 001 9910847089003321 005 20240909104215.0 010 $a3-031-56232-1 024 7 $a10.1007/978-3-031-56232-7 035 $a(CKB)31253139100041 035 $a(MiAaPQ)EBC31266839 035 $a(Au-PeEL)EBL31266839 035 $a(MiAaPQ)EBC31233395 035 $a(Au-PeEL)EBL31233395 035 $a(DE-He213)978-3-031-56232-7 035 $a(EXLCZ)9931253139100041 100 $a20240328d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProgress in Cryptology ? INDOCRYPT 2023 $e24th International Conference on Cryptology in India, Goa, India, December 10?13, 2023, Proceedings, Part I /$fedited by Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (364 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14459 311 $a3-031-56231-3 320 $aIncludes bibliographical references and index. 327 $aSymmetric-key cryptography, Hash functions, Authenticated Encryption Modes -- Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and cyclic shift -- On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweak Size -- From Substitution Box To Threshold -- Tight Security Bound of 2k-LightMAC Plus -- Designing Full-Rate Sponge based AEAD Modes -- Towards Minimizing Tweakable Blockcipher-based Generalized Feistel Net- works -- The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm -- Elliptic curves, Zero-knowledge proof, Signatures -- Generating Supersingular Elliptic Curves over Fp with Unknown Endmorphism Ring -- Kummer and Hessian meet in the Field of Characteristic 2 -- Synchronized Aggregate Signature under Standard Assumption in the Random Oracle Model -- Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies -- Attacks -- A CP-based Automatic Tool for Instantiating Truncated Differential Characteristics -- Falling into Bytes and Pieces ? Cryptanalysis of an Apple Patent Application -- Grover on chosen IV related key attack against GRAIN-128a -- Concrete Time/Memory Trade-Offs in Generalised Stern?s ISD Algorithm -- Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2. 330 $aThe two-volume proceedings constitutes the refereed proceedings of the 24th International Conference on Progress in Cryptology, INDOCRYPT 2023, Goa, India, in December 2023. The 26 full papers were carefully reviewed and selected from 74 submissions. They are organized in topical sections as follows: Part One: Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes; Elliptic curves, Zero-knowledge proof, Signatures; Attacks. Part Two: Secure computation, Algorithm hardness, Privacy; Post-quantum cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14459 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science$xMathematics 606 $aComputer science 606 $aArtificial intelligence 606 $aCryptology 606 $aMathematics of Computing 606 $aTheory of Computation 606 $aArtificial Intelligence 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science$xMathematics. 615 0$aComputer science. 615 0$aArtificial intelligence. 615 14$aCryptology. 615 24$aMathematics of Computing. 615 24$aTheory of Computation. 615 24$aArtificial Intelligence. 676 $a929 702 $aChattopadhyay$b Anupam 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910847089003321 996 $aProgress in Cryptology ? INDOCRYPT 2023$94242289 997 $aUNINA