This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.
The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, Indi...
The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. Shor, Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer, SIAMJ.Sci.Statist.Comput.41(2):303-332, 1999)thecollapseofsomeofthemostwidelyusedtechniquesfor securingdigital communications has become a possibility. In consequence, the everlasting duty of the cryptographic research community to keep an eye on alternative te- niques has become an urgent necessity. Post-quantum cryptography was born. Its primary...
The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. S...