Introduction
Indocrypt 2016 is the 17th International Conference on Cryptology in India. The conference will take place during December 11-14, 2016 at Indian Statistical Institute in Kolkata. Indocrypt 2016 is part of the Indocrypt series organized under the aegis of the Cryptology Research Society of India.
Important Dates
- Submission deadline:
July 25, 2016August 02, 2016 (17:30 GMT/23:00 IST) - Notification to authors:
September 12, 2016Septemeber 16, 2016September 19, 2016 - Final versions of accepted papers:
October 3, 2016October 5, 2016 - Tutorials: December 11, 2016
- Conference: December 12-14, 2016
General Chair
- Bimal Roy, Indian Statistical Institute Kolkata, India
Program Chairs
- Orr Dunkelman, University of Haifa, Israel
- Somitra Kr Sanadhya, Indraprastha Institute of Information Technology Delhi, India
Program Committee
- Diego Aranha, University of
Campinas, Brazil
- Jean-Philippe Aumasson, Kudelski Security,
Switzerland
- Steve Babbage,
Vodafone Group plc, UK
- Rishiraj Bhattacharyya, ISI Kolkata,
India
- Begül Bilgin, KU Leuven,
Belgium
- Céline Blondeau, Aalto University,
Finland
- Andrey Bogdanov, Technical University
of Denmark, Denmark
- Itai Dinur, Ben-Gurion University of
the Negev, Israel
- Orr Dunkelman (Chair), University
of Haifa, Israel
- Helena Handschuh,
Crytography Research, USA and KU Leuven, Belgium
- Carmit Hazay, Bar-Ilan University,
Israel
- Takanori Isobe, Sony Corporation, Japan
- Nathan Keller, Bar Ilan University,
Israel
- Tanja Lange, Technische Universiteit
Eindhoven, Netherlands
- Gaëtan Leurent, INRIA,
France
- Atefeh Mashatan, Canadian Imperial Bank of Commerce, Canada
- Florian
Mendel, Graz University of Technology, Austria
- Katerina Mitrokotsa, Chalmers
University of Technology, Sweden
- Amir Moradi, Ruhr
Universitaet Bochum, Germany
- Debdeep Mukhopadhyay, IIT Kharagpur,
India
- David Naccache, ENS, France
- Michael Naehrig, Microsoft
Research, USA
- Elisabeth Oswald, University of
Bristol, UK
- Arpita Patra, Indian
Institute of Science Bangalore, India
- Thomas Peyrin, Nanyang
Technological University, Singapore
- Axel
Poschmann, NXP Semiconductors, Germany
- Vanishree Rao,
PARC, USA
- Francisco Rodríguez Henríquez,
CINVESTAV-IPN, Mexico
- Bimal Roy, ISI Kolkata, India
- Somitra Kr Sanadhya (Chair),
IIIT Delhi, India
- Santanu Sarkar, IIT Madras,
India
- Jean-Pierre Seifert, Technische
Universitt Berlin, Germany
- Sourav Sen Gupta, ISI Kolkata, India
- Francois-Xavier Standaert, UCL,
Belgium
- Muthuramakrishnan
Venkitasubramaniam, University of Rochester, USA
- Xiaoyun
Wang, Tsinghua University, China
Submission Server
Click here to submit your paper.
Some reminders:
- Papers must be anonymous.
- Papers must not be submitted to more than one conference or journal at the same time.
- Papers should be in scope for the conference. In other words, they should have some relation to cryptography or information security. Authors must explain the relevance of their paper to these subjects.
- Papers should be at most 16 pages (excluding bibliography and appendices) with any number of appendices. They should be typeset with atleast 11 point fontsize and reasonable margins. Committee members are not required to read more than 16 pages.
Call for Papers
The call for papers is also available in PDF.
Since its introduction in 2000, Indocrypt has been widely acknowledged as the leading Indian venue for cryptography. Additionally, Indocrypt is well known and established around the cryptographic world, attracting cryptographers from all around the world. This year, the conference returns once again to Kolkata (where it was founded).
Original papers on all technical aspects of cryptology are solicited for submission. This includes works on foundational, practical, and industry-related aspects with contributions in various areas including security models, cryptographic primitives, cryptographic protocols, cryptanalysis, hardware and software implementation aspects, and applications. Submissions focusing on cryptographic aspects of network security, complexity theory, information theory, coding theory, number theory, and quantum computing are welcome.
Instructions for authors of papers
Submissions must not substantially duplicate work that any of the authors has published/submitted in a journal or a conference/workshop with proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. The Indocrypt 2016 Chairs reserve the right to share information about submissions with other program committees or journal editors to detect parallel submissions. In addition, the Indocrypt Chairs reserve the right to contact an author's institution/corporation and/or other appropriate organizations if an irregular submission is detected.
Submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords. The length of the submission should be at most 16 pages excluding bibliography and appendices using Springer's LNCS package (see instructions at http://www.springer.de/comp/lncs/authors.html), with no changes to the style (i.e. single column with at least 11pt size font with reasonably sized margins). Any number of clearly marked appendices may be supplied following the main body of the paper. However, the committee members are not required to read appendices; the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Submitted papers must be in PDF format and should be submitted electronically. A detailed description of the electronic submission procedure is available via https://indocrypt2016.cs.haifa.ac.il/iChair/.
The proceedings will be published in Springer's Lecture Notes in Computer Science series, and will be available at the conference.
Authors of accepted papers must guarantee that their paper will be presented at the conference.
Accepted Papers
-
6. Atomic AES: A Compact Implementation of the AES Encryption/Decryption Core
Subhadeep Banik, Temasek Labs, Nanyang Technological University, Singapore
Andrey Bogdanov, DTU Compute, Technical University of Denmark, Denmark
Francesco Regazzoni, ALARI, University of Lugano, Switzerland
-
9. On Linear Hulls and Trails
Tomer Ashur, KU Leuven, Belgium
Vincent Rijmen, KU Leuven, Belgium
-
14. Verifiable Computation for Randomized Algorithm
Muhua Liu, Chinese Academy of Sciences, China
Ying Wu, Chinese Academy of Sciences, China
Rui Xue, Chinese Academy of Sciences, China
-
15. Implicit Quadratic Property of Differentially 4-Uniform Permutations
Theo Fanuela Prabowo, Temasek Laboratories, National University of Singapore, Singapore
Chik How Tan, Temasek Laboratories, National University of Singapore, Singapore
-
17. Approximate-Deterministic Public Key Encryption from Hard Learning Problems
Yamin Liu, Chinese Academy of Sciences, China
Xianhui Lu, Chinese Academy of Sciences, China
Bao Li, Chinese Academy of Sciences, China
Wenpan Jing, Chinese Academy of Sciences, China
Fuyang Fang, Chinese Academy of Sciences, China
-
18. Receiver Selective Opening Security from Indistinguishability Obfuscation
Dingding Jia, Chinese Academy of Sciences, China
Xianhui Lu, Chinese Academy of Sciences, China
Bao Li, Chinese Academy of Sciences, China
-
21. Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
Lorenzo Grassi, IAIK, Graz University of Technology, Austria
Christian Rechberger, IAIK, Graz University of Technology, Austria and DTU Compute, Technical University of Denmark, Denmark
-
28. Blending FHE-NTRU Keys - The Excalibur Property
Louis Goubin, Laboratoire de Mathétiques de Versailles, UVSQ, CNRS, Université Paris-Saclay, France
Francisco José Vial Prado, Laboratoire de Mathétiques de Versailles, UVSQ, CNRS, Université Paris-Saclay, France
-
32. Revocable Decentralized Multi-Authority Functional Encryption
Hikaru Tsuchida, NEC Corporation, Japan
Takashi Nishide, University of Tsukuba, Japan
Eiji Okamoto, University of Tsukuba, Japan
Kwangjo Kim, KAIST, Korea
-
36. The Shortest Signatures Ever
Mohamed Saied Emam Mohamed, Technische Universitä Darmstadt, Germany
Albrecht Petzoldt, Kyushu University, Japan
-
38. UC-secure and Contributory Password-Authenticated Group Key Exchange
Lin Zhang, Chinese Academy of Sciences, China
Zhenfeng Zhang, Chinese Academy of Sciences, China
-
44. Related-Key Cryptanalysis of Midori
David Gerault, Limos, France
Pascal Lafourcade, Limos, France
-
52. Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
Peter Pessl, Graz University of Technology, Austria
-
58. On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography
Doug Miller, University of Rochester, USA
Adam Scrivener, University of Rochester, USA
Jesse Stern, University of Rochester, USA
Muthuramakrishnan Venkitasubramaniam, University of Rochester, USA
-
68. CRT-based Outsourcing Algorithms for Modular Exponentiations
Lakshmi Kuppusamy, Society for Electronic Transactions and Security (SETS), India
Jothi Rangasamy, Society for Electronic Transactions and Security (SETS), India
-
76. Score-based vs. Probability-based Enumeration -- a Cautionary Note -
Marios Omar Choudary, Politehnica University of Bucharest, Romania
Romain Poussier, UCL Crypto Group, Belgium
Francois-Xavier Standaert, UCL Crypto Group, Belgium
-
77. Format Preserving Sets: On Diffusion Layers Of Format Preserving Encryption Schemes
Kishan Chand Gupta, Applied Statistics Unit, Indian Statistical Institute, Kolkata, India
Sumit Kumar Pandey, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore
Indranil Ghosh Ray, Department of Electrical and Electronic Engineering, City University, London, UK
-
80. Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
Afonso Arriaga, SnT, University of Luxembourg, Luxembourg
Manuel Barbosa, HASLab - INESC TEC, DCC FC University of Porto, Portugal
Pooya Farshim, ENS, CNRS & INRIA, PSL Research University, Paris, France
-
83. Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
Brian Koziel, Texas Instruments, USA
Reza Azarderakhsh, Florida Atlantic University, USA
Mehran Mozaffari Kermani, Rochester Institute of Technology, USA
-
88. Adaptively Secure Strong Designated Signature
Neetu Sharma, PRS University, India
Rajeev Anand Sahu, AIMSCS, India
Vishal Saraswat, AIMSCS, India
Birendra Kumar Sharma, PRS University, India
-
89. AEZ: Anything-but EaZy in Hardware
Ekawat Homsirikamol, George Mason University, USA
Kris Gaj, George Mason University, USA
-
90. Secret Sharing for mNP: Completeness Results
Mahabir Prasad Jhanwar, Ashoka University, India
Kannan Srinathan, IIIT Hyderabad, India
-
92. Some Proofs of Joint Distribution of Keystream Biases in RC4
Sonu Jha, Grocme Ltd., Kolkata, India
Subhadeep Banik, Temasek Labs, Nanyang Technological University, Singapore
Takanori Isobe, Kobe University, Kobe, Japan
Toshihiro Ohigashi, Tokai University, Tokai, Japan
Conference Proceedings
The conference proceedings are now available online as Springer LNCS Volume number 10095 at this link.
Venue
Indian Statistical Institute, Kolkata
203 Barrackpore Trunk Road, Kolkata 700108, India
Phone: 033-25752001; Fax: 033-25776680; Email: indocrypt2016@gmail.com
Map for ISI, Kolkata;
ISI Campus Map [pdf]
Indian Statistical Institute (ISI), a unique P. C. Mahalanobish institution devoted to the research, teaching and application of statistics, natural sciences and social sciences. Founded by Professor P.C. Mahalanobis in Kolkata on 17th December, 1931, the institute gained the status of an Institution of National Importance by an act of the Indian Parliament in 1959.
The Headquarters of ISI is located in the northern fringe of the metropolis of Kolkata. Additionally, there are four centres located in Delhi, Bangalore, Chennai and Tezpur. Research in Statistics and related disciplines is the primary activity of the Institute. Teaching activities are undertaken mainly in Kolkata, Delhi and Bangalore. Offices of the Institute located in several other cities in India are primarily engaged in projects and consultancy in Statistical Quality Control and Operations Research'.
Indian Currency
The Government of India has recently demonetized the old Rs 500 and Rs 1000 currency notes. This has impacted short term availability of cash at many places in the country. We advice participants from abroad to plan for this. Specifically, either carry new currency notes of Rs 500 and Rs 2000, or carry the currency notes of Rs 100, or pay by cards wherever it is possible to do so.
Accommodation
Suggested hotels:
Mid and high range hotels:
We suggest The Fern Hotel and Resorts (Mid Range hotel) Website
We have negotiated a special conference rate in this hotel. For booking a room at conference rates, please book the room before November 10, 2016. To avail of this discounted rate send a mail to sales.fr.kolkata@fernhotels.com and res.fr.kolkata@fernhotels.com with CC to indocrypt2016@gmail.com The booking details will be mailed to you. If you book the room late, the rooms might still be available but not at the discounted rates.
There are many good hotels in the city. If you would like to book a high end hotel, then The Park or Taj Bengal are good options, among others.
Economy hotels:
We suggest the following two hotels. Please note that we have not negotiated any conference rates with these hotels.
(a) Airport city hotel Website
(b) Ehnotel hotel Website
Accommodation at ISI Kolkata:
Please note that we could get only a few rooms in the guesthouse and student dormitories for Indocrypt participants, as a few other coferences are also being organized by the institute during the same period. All of these rooms are already booked. The Indocrypt 2016 organizing team can't provide any more accommodation support to participants at the venue. Please make your own arrangements for stay at Kolkata during the conference.
Local travel :
Attendees staying at Fern Hotel and resorts may book airport pickup and drop cabs (cost is approx. USD 15) provided by the hotel. The charges can be paid by card at the hotel. Please mail the hotel directly to book this. (Prepaid taxis are also available at the Kolkata airport. Please go to the appropriate counter at the airport for these. It is not certain if this counter accepts card payments.)
For all the participants staying at the Fern hotel, we are providing free pickup and drop from Fern hotel to the venue on all conference days. The conference bus will start at 08:00 AM from the Fern hotel on each day.
Registration
Students (Indian or Foreign) will be considered for Registration Fee waiver in case they are presenting their paper at the conference. Student authors of papers, but those who are not presenting their papers, may also be considered likewise. Students interested in applying for registration fee waiver should write at the official conference mail-id with a copy of their CV and giving justification for seeking the waiver.
Special Discount
Members of CRSI are allowed 25% discount in the registration fees.
Registration fee
Designation | Foreign Participants | Indian Participants | ||
Till October 31, 2016 | From November 1, 2016 | Till October 31, 2016 | From November 1, 2016 | |
Academia | US$ 600 | US$ 650 | INR 7000 | INR 8000 |
Students | US$ 300 | US$ 350 | INR 2000 | INR 3000 |
Industry | US$ 700 | US$ 750 | INR 9000 | INR 10000 |
Wire Transfer Details (Click here for a signed copy of bank details)
Name of the Account Holder | R.C. Bose Centre for Cryptology & Security |
Name of the Bank | IDBI Bank |
Name & Address of the Branch | Sinthir More, 277/2/1, B.T. Road, Kolkata-700036 |
Account Number and Type | 0399102000003001 (Current Account) |
IFSC | IBKL0000399 |
MICR | 700259018 |
SWIFT Code | IBKLINBB060 |
PAN Card No. | AAAAI0345R |
Purpose to be Mentioned | INDOCRYPT-2016 Registration Fee: |
Registration Details
Step 1Pay the registration fees by wire transfer (bank details above) and note down the wire transfer transcation reference number.
Step 2
Download the registration form (DOC, PDF) and fill up the same.
Step 3
Please send the scanned copy of the duly filled registration form and scanned copy of the electronic fund (wire) transfer to indocrypt2016@gmail.com. Once the registration is confirmed, you will be intimated by an email.
Tutorial Speakers
-
Orr Dunkelman, University of Haifa, Israel.
Brief Bio:
Orr Dunkelman is an associate professor in the Computer Science department at the University of Haifa. His research focuses on cryptanalysis, cryptography, security, and privacy. He is best known for his work on symmetric-key cryptanalysis, mostly of block ciphers, and the introduction of new cryptanalytic techniques. Orr has worked on many of the most widely deployed ciphers such as the AES, KASUMI (used in 3G mobile networks), A5/1 (used in GSM networks), and IDEA, publishing more than 80 papers in international venues. He served in more than 70 conference committees (including as a program chair of FSE 2009, CT-RSA 2012, and SAC 2015), and has won several distinctions and awards (e.g., best paper awards in Crypto 2012 and FSE 2012 and the Krill award in 2014). Orr obtained his Ph.D. in computer science in 2006 from the Technion, Israel Institute of Technology, where he graduated with B.A. in 2000.
Title of the talks:
1. A Quick Introduction to Statistical Attacks on Block Ciphers
2. Attcking Block Ciphers through the Key Schedule
-
Claudio Orlandi, University of Aarhus, Denmark.
Brief Bio:
Claudio Orlandi got his PhD in 2011 from Aarhus University (Denmark), where he works now as an associate professor after a postdoc at Bar-Ilan University (Israel). During the last decade he has made significant contributions to the theory and practice of cryptographic protocols, with focus on two-party secure computation protocols with security against active adversaries. He is the chair of an European network of research in cryptography for secure digital interaction (CryptoAction).
Title of the talk:
Efficient Secure Two-Party Computation Protocols
Schedule
Time |
Session |
Type |
Title / Author(s) |
---|---|---|---|
11/12/16: Tutorial Day |
|||
8:00 to 9:00 |
Registration |
||
9:00 to 10:30 |
Tutorial |
#1 |
A Quick Introduction to Statistical Attacks on Block Ciphers |
10:30 to 11:00 |
Tea |
||
11:00 to 12:30 |
Tutorial |
#2 |
Attcking Block Ciphers through the Key Schedule |
12:30 to 14:00 |
Lunch Break (90 minutes) |
||
14:00 to 15:30 |
Tutorial |
#3 |
Efficient Secure Two-Party Computation Protocols |
15:30 to 16:00 |
Tea Break (30 minutes) |
||
16:00 to 17:30 |
Tutorial |
#4 |
Efficient Secure Two-Party Computation Protocols ... continued |
12/12/16: Conference Day 1 |
|||
8:15 to 9:15 |
Registration |
||
9:15 to 9:30 |
Opening Remarks |
||
9:30 to 11:30 |
Public-Key Session |
Paper |
Session chair: R. Balasubramanian Approximate-Deterministic Public Key Encryption from Hard Learning Problems Blending FHE-NTRU Keys - The Excalibur Property The Shortest Signatures Ever Adaptively Secure Strong Designated Signature |
11:30 to 12:00 |
Tea Break (30 minutes) |
||
12:00 to 13:00 |
Invited Talk |
Invited |
Session chair: Orr Dunkelman Breaking and Repairing Security Proofs of Authenticated Encryption Schemes |
13:00 to 14:30 |
Lunch Break (90 minutes) |
||
14:30 to 16:00 |
Protocols Session |
Paper |
Session chair: Rana Barua Verifiable Computation for Randomized Algorithm UC-secure and Contributory Password-Authenticated Group Key Exchange CRT-based Outsourcing Algorithms for Modular Exponentiations |
16:00 to 16:30 |
Tea Break (30 minutes) |
||
16:30 to 17:30 |
Side Channel Session |
Paper |
Session chair: Mridul Nandi Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures Score-based vs. Probability-based Enumeration -- a Cautionary Note - |
13/12/16: Day 2 |
|||
9:00 to 10:30 |
Implementation Session |
Paper |
Session chair: Mohamed Saied Emam Mohamed Atomic AES: A Compact Implementation of the AES Encryption/Decryption Core Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA AEZ: Anything-but EaZy in Hardware |
10:30 to 11:00 |
Tea Break (30 minutes) |
||
11:00 to 12:00 |
Functional Encryption Session |
Paper |
Session chair: Rishiraj Bhattacharya Revocable Decentralized Multi-Authority Functional Encryption Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation |
12:00 to 13:00 |
Invited Talk |
Invited |
Session chair: Somitra Sanadhya Fast Zero-Knowledge from Secure Computation
|
13:00 to 14:30 |
Lunch Break (90 minutes) |
||
14:30 to 16:30 |
Symmetric-Key Cryptanalysis Session |
Paper |
Session chair: Tetsu Iwata On Linear Hulls and Trails Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE Related-Key Cryptanalysis of Midori Some Proofs of Joint Distribution of Keystream Biases in RC4 |
18:00 and onwards |
Banquet at Begal Club. Please note the dress code. |
||
14/12/16: Day 3 |
|||
9:00 to 10:30 |
Foundations Session |
Paper |
Session chair: Claudio Orlandi Implicit Quadratic Property of Differentially 4-Uniform Permutations On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography Secret Sharing for mNP: Completeness Results |
10:30 to 11:00 |
Tea Break (30 minutes) |
||
11:00 to 12:00 |
New Constructions Session |
Paper |
Session chair: Palash Sarkar Receiver Selective Opening Security from Indistinguishability Obfuscation Format Preserving Sets: On Diffusion Layers Of Format Preserving Encryption Schemes |
12:00 to 13:00 |
Invited Talk |
Invited |
Session chair: Bimal Roy Leakage-Resilient Symmetric Cryptography (Overview of the ERC Project CRASH, Part II) |
13:00 to 14:00 |
Lunch Break (60 minutes) |
Invited Speakers
-
Francois-Xavier Standaert, UCL Crypto Group, Belgium
Brief Bio:
Francois-Xavier Standaert was born in Brussels, Belgium in 1978. He received the Electrical Engineering degree and PhD degree from the Universite catholique de Louvain, respectively in June 2001 and June 2004. In 2004-2005, he was a Fulbright visiting researcher at Columbia University, Department of Computer Science, Network Security Lab and at the MIT Medialab, Center for Bits and Atoms. In March 2006, he was a founding member of IntoPix s.a. From 2005 to 2008, he was a post-doctoral researcher of the UCL Crypto Group and a regular visitor of the two aforementioned laboratories. Since September 2008, he is associate researcher of the Belgian Fund for Scientific Research (F.R.S.-FNRS) and professor at the UCL Institute of Information and Communication Technologies, Electronics and Applied Mathematics (ICTEAM). In 2010, he was program co-chair of CHES (IACR's flagship workshop on cryptographic hardware). In June 2011, he has been awarded a Starting Independent Research Grant by the European Research Council. His research interests include digital electronics, FPGAs and cryptographic hardware, low power implementations for constrained environments (RFIDs, sensor networks, ...), the design and cryptanalysis of symmetric cryptographic primitives, physical security issues in general and side-channel analysis in particular.
Title of the talk:
Leakage-Resilient Symmetric Cryptography (Overview of the ERC Project CRASH, Part II). -
Claudio Orlandi, University of Aarhus, Denmark.
Brief Bio:
Claudio Orlandi got his PhD in 2011 from Aarhus University (Denmark), where he works now as an associate professor after a postdoc at Bar-Ilan University (Israel). During the last decade he has made significant contributions to the theory and practice of cryptographic protocols, with focus on two-party secure computation protocols with security against active adversaries. He is the chair of an European network of research in cryptography for secure digital interaction (CryptoAction).
Title of the talk:
Fast Zero-Knowledge from Secure Computation -
Tetsu Iwata, Nagoya University, Japan.
Brief Bio:
Tetsu Iwata is currently an associate professor in the Department of Computational Science and Engineering at Nagoya University. His research interest includes provable security aspects of various symmetric key constructions, and he is one of the designers of CMAC (Cipher-based Message Authentication Code), which was adopted by NIST as a recommended block cipher mode of operation. He was program co-chairs of FSE 2010, Asiacrypt 2014, and Asiacrypt 2015, and was appointed as general co-chair of FSE 2017. Tetsu Iwata received Dr.E. degree in electrical and electronic engineering from Tokyo Institute of Technology in 2002.
Title of the talk:
Breaking and Repairing Security Proofs of Authenticated Encryption Schemes
Conference Banquet
The banquet will be held at Bengal Club on the evening of Dec 13. Please note the dress code for the dinner.
Gentleman
Shirts or Collared T-shirts, Trousers, Covered shoes
or
Churidar/Kurta or Dhoti/Kurta, Sandals
NOT allowed
Jeans, Pyjamas, Chappals
Ladies
Saree or Churidar/kurta or Western clothes
NOT allowed
Jeans
Indian Visa
The e-Tourist Visa facility is available for nationals of more than 150 countries whose objective of visiting India is recreation, sight seeing, casual visit to meet friends or relatives, short duration medical treatment or casual business visit. The e-Tourist Visa facility involves completely online application for which no facilitation is required by any intermediary / agents etc.
A conference visa may also be obtained from the concerned Indian Mission. The documents required would be mailed to you. If you require an invitation letter for a conference visa then please get in touch with us.
You can also mail us if you need any further support.
Approval from the Department of Atomic Energy is available here: DAE approval
Approval from the Ministry of Home Affairs is available here: MHA approval