Indocrypt 2010 - 11th International Conference on Cryptology in India

Welcome to Indocrypt 2010

#ImportantDates|#ProgramChairs|#GeneralChairs|#Accommodation|#Location

|#DirectionsTransport|#CityTour|#committee|#Registration|#AcceptedPapers

|#InvitedTalks|#Technical

Indocrypt 2010 is organized by CRRAO Advanced Institute of Mathematics, Statistics and Computer Science (AIMSCS), Hyderabad , under the aegis of Cryptology Research Society of India (CRSI), India 

Important Dates

  • Submission deadline: July 30, 2010
  • Authors notification: September 17, 2010 
  • Final version: September 24, 2010 
  • Conference: December 12-15, 2010 

Program Chairs

General Chairs

The conference will be held at Hyderabad Marriott Hotel & and Convention CenterSapphire Ballroom-1 ,   Lower Tank Bund Road, Hyderabad, India. 

The venue is located opposite the famous Hussain Sagar Lake, Tank Bund Road.

Way to reach Hyderabad Marriott Hotel & and Convention Center:

Details of accomodation for Indocrypt'10 participants

S. No. 

Hotel/Guest House

Facilities and Tariff Available

No of rooms/suits/beds blocked

1. 

COURTYARD, MARRIOTT, HYDERABAD, 1-3-1024, Lower Tank Bund Road, Hyderabad - 500080

4-Star Hotel Rs. 3,500/- for single occupancy and Rs. 4,000/- for double occupancy. Includes breakfast also. This is the venue of the conference also. Note that Rack rate is Rs. 7,000/- per night. The above rates are special for INDOCRYPT 

30 double bed suits

2. 

SILICON VILLE Divya Darshini Hospitality Services Pvt., Ltd Plot No.9, Jayabheri Enclave, Phase-II Gachibowli, Hyderabad - 500032 

Service Apartments with excellent facilities Rs. 1700, per night for single occupancy and Rs. 1800/- for double occupancy. Air-conditioned, neat and clean, free breakfast, flat TV in each room, Telephone, hot water 24X7, Wi-Fi in each room etc. Note that Rack rate is Rs. 3,250/- for double occupancy and Rs. 2,800 for single occupancy. The above rates are negotiated for INDOCRYPT participants. 

20 double bed suites. 

3. 

University of Hyderabad Guest House, Prof CR Rao Road, Gachibowli, Hyderabad - 500046 

Approximately Rs. 600/- per night for double occupancy, which means Rs. 300 per head. Includes breakfast and dinner. Air-conditioned suites. Preference will be given to invited speakers. 

6 double bed suites 

4.

University of Hyderabad DORMITARY Prof CR Rao Raod, Gachibowli, Hyderabad - 500046

Approximately Rs. 150/- per bed including breakfast & dinner. Dormitary, four beds in each room with attached bath, air-conditioned, hot water facility. Reserved for student participants only. 

12 beds only. 

University of Hyderabad, Student Hostel 

Free lodging and meals for student participants

50 beds

  • The Organizing Committee will provide FREE TRANSPORT to all the participants from all the guest houses to the venue of the conference and back on all days.
  • The above accommodation will be allotted on first-cum-first serve basis and kindly forward your requirements directly to Mr K. Nageswara Rao, Organizing Chair, Email: indocrypt2010@gmail.com. Mobile: 9440726706.
  • Participants may book their accommodations at S. No. (1) and (2) above directly opening their respective websites, for which links are provided. However, participants may also please forward their booking details to the organizing chair for information and follow-up if necessary. Participants who need accomodation at S. No. (3), (4) and (5) above have to necessarily approach the organizing chair. 
  • We can negotiate with any other hotel in the city for the best tariff provided participants come forward to stay in groups of not less than ten. Please understand the fact that if the number is large, we can negotiate the best tariff.
  • The Organizing Committee will do everything needed to ensure comfort for the participants. We look forward to meeting you at the INDOCRYPT - 2010.

Location of Conference Venue, Different Accommodation Venues and Nearest Places

  • A: Rajiv Gandhi International Airport, Hyderabad 
  • B: Hotel Marriott, Kavadiguda, Hyderabad
  • C: Silicon Ville (beside Kinderkare Day Care Preschool), #3 Jayabheri Enclave, Gachibowli, Hyderabad
  • D: Hyderabad Central University, Hyderabad 
  • E: Secunderabad Railway Station, Regimental Bazaar, Hyderabad
  • F: Hyderabad (also known as Nampally) Railway Station
  • G: Hitech City MMTS Railway Station, Hyderabad
  • H: Lingampally MMTS Railway Station, Hyderabad
  • I: Gachibowli Circle, Hyderabad 

Directions/Transport Information 

From Airport (A) to Marriott (B) 
Distance: Approximately 35 kms 
Transport Options: 
Prepaid Taxi: 
Aero Express Bus : Get down at Secretariat. From Secretariate to Hotel Marriott, the distance is nearly 1 km. Auto Ricksaw is available. 

From Airport (A) to Silicon Ville (C) 
Distance: Approximately 30 kms 
Transport Options: 
Prepaid Taxi: 
Aero Express Bus : Get down at Gachibowli Circle (i.e. postion (I) in the map). The distance to Silicon Ville is 1km form Gachibowli Circle. Auto Ricksaw is available. 

From Airport (A) to Hyderabad Central University (D) 
Distance: Approximately 35 kms 
Transport Options: 
Prempaid Taxi: 
Aero Express Bus : Get down at Gachibowli Circle (i.e. postion (I) in the map). The distance to Hyderabad Central University is 3km form Gachibowli Circle. Auto Ricksaw is available. 

From Hyderabad Railway Station (F) to Marriott (B) 
Distance: Approximately 8 kms
Transport Options: Auto, Taxi

From Hyderabad Railway Station (F) to Silicon Ville (C)
Distance: Approximately 25 kms
Transport Options: Take MMTS local train and get down at Hi-tech City Railway Station (G). The distance to Silicon Ville is 5kms from the hi-tech City station. Auto Ricksaw is available.

From Hyderabad Railway Station (F) to Hyderabad Central University (D)
Distance: Approximately 25 kms
Transport: Take MMTS local train and get down at Lingampally Railway Station (H). The distance to University is 5kms from the Lingampally Railway station. Auto Ricksaw is available.

From Secunderabad Railway Station (E) to Marriott (B)
Distance: Approximately 6 kms
Transport Options: Auto, Taxi

From Secunderabad Railway Station (E) to Silicon Ville (C)
Distance: Approximately 25 kms
Transport Options: Take MMTS local train and get down at Hi-tech City Railway Station (G). The distance to Silicon Ville is 5kms from the hi-tech City station. Auto Ricksaw is available.

From Secunderabad Railway Station (E) to Hyderabad Central University (D)
Distance: Approximately 25 kms
Transport: Take MMTS local train and get down at Lingampally Railway Station (H). The distance to University is 5kms from the Lingampally Railway station. Auto Ricksaw is available.

Indocrypt2010 City Tour 

Dear Participants, with the sole intention of showing some important tourist attractions of the Hyderabad city to the participants and their spouses, the Organizing Committee proposes half a day tour to see areas around Hussain Sagar, Charminar and Golconda Fort in the city. The tour is scheduled to begin at 2.30 PM on 15th Dec, 2010 with a guide accompanying you from Hyderabad Marriott Hotel, the venue of the Conference and concludes at about 7.30 PM, late in the evening. The tour is more or less a sponsored event, but we would like to collect token charges like Rs. 200 per head or US$5 for foreign participants. We take care of your travel, entry fees at all gates and mineral water / snacks will be provided during the tour. Who so ever is interested to join the tour may send an email to indocrypt2010tour@gmail.com with the following information: 

  • Name & Affiliation: 
  • E-mail ID: 
  • Contact Tel No.if any:
  • With or without guest: with (specify the number) or without 

Kindly note that the tour will be organized only if we receive certain minimum response from participants. Kindly extend your cooperation to serve you better. The following personnel, Ms. Deepika and Mr. Suresh will be available at indocrypt2010tour@gmail.com to answer any further queries. 

Further Details will be available at the conference.

Original research papers on all technical aspects of cryptology are solicited for submission to Indocrypt 2010.

Instructions to authors.

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with formally published proceedings. Accepted submissions may not appear in any other conference or workshop with proceedings. The submission must be anonymous, with NO author names, affiliations, acknowledgements, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Submissions not meeting these guidelines risk rejection without consideration of their merits.

The paper should be at most 12 pages excluding the bibliography and appendices, and at most 20 pages total using at least 11-point font and reasonable margins. The authors are encouraged to prepare their submission in Latex following Springer's guideline. Submitted papers must be in PDF format and should be submitted electronically.

Authors of accepted papers must guarantee that their paper will be presented at the conference. One registration is compulsory against each accepted paper.

Technical program committee

Chairs:

Members:

  • Abhijit Das, IIT Kharagpur, India
  • Alfred Menezes, University of Waterloo, Canada
  • Amr Youssef, Concordia University, Canada
  • Anne Canteaut, INRIA Paris-Rocquencourt, France 
  • Ayineedi Venkateswarlu, CRRAO AIMSCS, Hyderabad, India 
  • C. Pandu Rangan, IIT Chennai, India 
  • C. E. Veni Madhavan, IISC Bangalore, India 
  • Claude Carlet, University of Paris 8, France 
  • Colin Boyd, Queensland University of Technology, Australia 
  • Daniel J. Bernstein, University of Illinois at Chicago, USA 
  • Debrup Chakraborty, CINVESTAV-IPN, Mexico City, Mexico 
  • Goutam Paul, Jadavpur University, Kolkata, India 
  • Honggang Hu, University of Waterloo, Canada 
  • Huaxiong WANG, Nanyang Technological University, Singapore 
  • Kouichi Sakurai, Kyushu University, Japan 
  • Lily Chen, NIST , USA 
  • Manoj Prabhakaran, University of Illinois, Urbana-Champaign 
  • Miodrag Mihaljevic, RCIS-AIST, Tokyo, & Math. Inst. SANU, Belgrade 
  • Mridul Nandi, The George Washington University, USA 
  • Nicolas Sendrier, INRIA, France 
  • Nicolas Theriault, Universidad de Talca, Chile 
  • P. K. Saxena, SAG, Delhi, India 
  • Praveen Gauravaram, Technical University of Denmark 
  • Rei Safavi-Naini, University of Calgary, Canada 
  • Sanjit Chatterjee, University of Waterloo, Canada
  • Shaoquan Jiang, University of Electronic Science and Technology of China 
  • Sherman S. M. Chow, New York University, USA 
  • Steven Galbraith, Auckland University, New Zealand 
  • Sugata Gangopadhyay, IIT Roorkee, India 
  • Sushmita Ruj, Lund University, Sweden 
  • Tanja Lange, Technische Universiteit Eindhoven, Netherlands 
  • Tor Helleseth, University of Bergen, Norway 
  • Vincent Rijmen, Graz University of Technology, Austria 
  • Vipul Goyal, Microsoft Research, India 
  • Willi Meier, FHNW, Switzerland 
  • Xuejia Lai, Shanghai Jiao Tong University, China

Organizing committee: 

General chairs:

  • S.B. Rao, C R Rao AIMSCS, India
  • Bimal K. Roy, ISI, Kolkata, India

Organizing Co-Chairs:

  • Rajat Tandon, University of Hyderabad, India
  • Arun Agarwal, University of Hyderabad, India
  • K. Nageswara Rao, C R Rao AIMSCS, India

Organizing committee:

  • V.Ch. Venkaiah, C R Rao AIMSCS, India
  • Chakravarthy Bhagvathi, University of Hyderabad, India
  • Y.V. Subba Rao, University of Hyderabad, India
  • Mahabir Prasad Jhanwar, C R Rao AIMSCS, India
  • M. Prem Laxman Das, C R Rao AIMSCS, India
  • Prabal Paul, C R Rao AIMSCS, India
  • Anil Kumar, C R Rao AIMSCS, India
  • Neelima Jampala, C R Rao AIMSCS, India
  • G. Uma Devi, C R Rao AIMSCS, India

Registration information for INDOCRYPT 2010

For the conference (December 13-15, 2010)

Foreign Participants

Indian Participants 

Before October 31, 2010

After October 31, 2010

Before October 31, 2010

After October 31, 2010

academia

US$ 400

US$ 450

INR 4500

INR 5000

students

US$ 250

US$ 300

INR 2000

INR 2500

industry

US$ 550

US$ 600

INR 7000

INR 8000

For the tutorials (December 12, 2010) 

Foreign Participants

Indian Participants 

Before October 31, 2010

After October 31, 2010

Before October 31, 2010

After October 31, 2010

academia

US$ 75

US$ 100

INR 1000

INR 1500

students

US$ 50

US$ 60

INR 500

INR 700

industry

US$ 75

US$ 100

INR 1000

INR 1500

Note: Members of CRSI are allowed 25% discount in the Registration Fees.

For Indian residents:

Payment shall be made by a Cheque/Demand Draft drawn in favour of INDOCRYPT 2010, drawn on any Nationalized Bank, payable at Hyderabad.

The cheque/demand draft must be sent to: 
C R Rao Advanced Institute of Mathematics, Statistics and Computer Science (AIMSCS)
Prof. C R Rao Road, University of Hyderabad Campus, Central University, Hyderabad-500046

For Foreign Delegates:

Payment should be made by wire transfer, as per the following details.

Punjab National Bank, Hitech City Branch (4106), 1Q4-A3, 1st Floor, Cyber Towers, Madhapur, Hyderabad-500081.

  • Account Name: INDOCRYPT 2010
  • Account Number (16 digits): 4106 0001 0002 3153
  • SWIFT CODE: PUNBINBBSRP
  • RTGS/IFSC CODE: PUNB0410600

Accepted Papers

  • Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity
  • Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
  • ECC2K-130 on NVIDIA GPUs
  • Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks
  • Combined Security Analysis of the One- and Three-pass Unified Model Key Agreement Protocols
  • New Boomerang Attacks on ARIA
  • Random Euclidean Addition Chain Generation and Its Apllication to Point Multiplication
  • One Byte per Clock: A Novel RC4 Hardware
  • Cryptanalysis of Tav-128 Hash function
  • Impossible Differential Cryptanalysis of AES-128
  • Indifferentiability Beyond the Birthday Bound for the Xor of Two Public Random Permutations
  • A Program Generator for Intel AES-NI Instructions
  • Cryptanalysis of a Perturbated White-Box AES Implementation
  • The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants
  • Speeding Up The Wide-pipe: Secure and Fast Hashing
  • CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key
  • Attack on a Higher-Order Masking of the AES Based on Homographic Functions
  • Partial Key Exposure Attack on RSA -- Improvements for Limited Lattice Dimensions
  • Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions using Hill Climbing
  • Greedy Distinguishers and Nonrandomness Detectors
  • The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
  • Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface

Invited Talks

Neal Koblitz

Title : Getting a Few Things Right and Many Things Wrong

Abstract:

The history of cryptography from ancient times to the present is full of tales of blunders and oversights, typically occurring when an over-confident encryptor is outwitted by a patient and clever cryptanalyst. In contrast, mathematics (if properly peer-reviewed) is perfect. There is never error, because by definition one cannot prove a theorem if it is false. So in order to remove the contingent and subjective elements from cryptography there have been concerted efforts in recent years to transform the field into a branch of mathematics, or at least a branch of the exact sciences. In my view, this hope is misguided, because in its essence cryptography is as much an art as a science. 
I will start by describing a setting (taken from a recent paper written with Alfred Menezes and Ann Hibner Koblitz) in which the conventional wisdom about parameter selection might (or might not) be wrong. Then I will illustrate the pitfalls of working in cryptography by giving a (far from exhaustive) survey of the many misjudgments I have made and erroneous beliefs I have had over the course of 25 years working in this field. I will then describe a few of the embarrassing moments in the history of "provable security", which is the name of an ambitious program that aims to transform cryptography into a science.

Slides

Bart Preneel

Title : Cryptographic Hash Functions: Theory and Practice

Abstract :

Cryptographic hash functions are an essential building block for security applications. Until 2005, the amount of theoretical research and cryptanalysis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5. Moreover, serious shortcomings have been identified in the theoretical foundations of existing designs. In response to this hash function crisis, a large number of papers has been published with theoretical results and novel designs. In November 2007, NIST announced the start of the SHA-3 competition, with as goal to select a new hash function family by 2012. About half of the 64 submissions were broken within months. We present a brief outline of the state of the art of hash functions half-way the competition and attempt to identify open research issues.

Slides

Tutorial Talks

Sanjit Chatterjee

Title : Pairing Based Cryptography

Abstract :

Bilinear pairing is now a well-accepted mathematical tool to build new cryptographic applications. This might appear a little paradoxical because not so long ago the same mathematical structure was considered as a main deterrent to the deployment of elliptic curve cryptography. The tutorial aims to trace the story of this changed perception in the crypto community. The narration is based on some novel construction of cryptographic protocols with an eye on the interplay of functionality, security and efficiency.

Slides

Guang Gong

Title : Lightweight Cryptography for RFID Systems

Abstract :

Radio frequency identification (RFID) is a technology for the automated identification of physical entities using radio frequency transmissions. In the past ten years, RFID systems have gained popularity in many applications, such as supply chain management, library systems, e-passports, contactless cards, identification systems, and human implantation. RFID is one of the most promising technologies in the field of ubiquitous and pervasive computing. Many new applications can be created by embedding an object with RFID tags. However, the rapid development of RFID systems raises serious privacy and security concerns that could prevent the benefits of RFID technology from being fully utilized. The tutorial covers three topics: a) Introduction to Security and Privacy of RFID Systems, b) Design of Lightweight Crypto primitives; c) Design of Authentication Protocols. 

Slides: part 1 ,part2part3

Technical program

1) black and white file; or if you like color, you may wish to download

2) Color file.

Contact:

K. Nageswara Rao, C R Rao AIMSCS, India

Telephone (o) : +91-40-23013118

Cell Phone : +91-9440726706

E-mail : indocrypt2010@gmail.com