Limit search to available items
Book Cover
E-book
Author International Conference on Cryptology in Africa (6th : 2013 : Cairo, Egypt)

Title Progress in cryptology -- AFRICACRYPT 2013 : 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, proceedings / Amr Youssef, Abderrahmane Nitaj, Aboul Ella Hassanien (eds.)
Published Berlin : Springer, [2013]
©2013

Copies

Description 1 online resource (xiii, 451 pages) : illustrations
Series Lecture notes in computer science ; 7918
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7918.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting / Carlos Aguilar Melchor, Slim Bettaieb -- GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field / Utsab Bose, Anup Kumar Bhattacharya -- On Constructions of Involutory MDS Matrices / Kishan Chand Gupta, Indranil Ghosh Ray -- Homomorphic Encryption with Access Policies: Characterization and New Constructions / Michael Clear, Arthur Hughes, Hitesh Tewari -- Brandt's Fully Private Auction Protocol Revisited / Jannik Dreier, Jean-Guillaume Dumas -- HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems / Alexandre Duc, Serge Vaudenay -- Attacking AES Using Bernstein's Attack on Modern Processors / Hassan Aly, Mohammed ElGayyar -- Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model / Philippe Guillot, Abdelkrim Nimour -- NaCl on 8-Bit AVR Microcontrollers / Michael Hutter, Peter Schwabe -- W-OTS+ -- Shorter Signatures for Hash-Based Signature Schemes / Andreas Hülsing
New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs / Ayesha Khalid, Goutam Paul -- Cryptanalysis of AES and Camellia with Related S-boxes / Marco Macchetti -- New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 / Subhamoy Maitra, Goutam Paul, Santanu Sarkar -- Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design / Louis Goubin, Ange Martinelli, Matthieu Walle -- Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority / Isheeta Nargis, Payman Mohassel, Wayne Eberly -- Impact of Optimized Field Operations AB, AC and AB + CD in Scalar Multiplication over Binary Elliptic Curve / Christophe Negre, Jean-Marc Robert -- An Attack on RSA Using LSBs of Multiples of the Prime Factors / Abderrahmane Nitaj -- Modification and Optimisation of an ElGamal-Based PVSS Scheme / Kun Peng -- Studying a Range Proof Technique -- Exception and Optimisation / Kun Peng, Li Yi
Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model / Duong Hieu Phan, Viet Cuong Trinh -- Fast Software Encryption Attacks on AES / David Gstir, Martin Schläffer -- Sieving for Shortest Vectors in Ideal Lattices / Michael Schneider -- An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection / Sebastian Staamann -- A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers / Fabian van den Broek, Erik Poll -- On the Expansion Length Of Triple-Base Number Systems / Wei Yu, Kunpeng Wang, Bao Li, Song Tian -- Triple-Base Number System for Scalar Multiplication / Louis Goubin, Ange Martinelli, Matthieu Walle -- Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority / Isheeta Nargis, Payman Mohassel, Wayne Eberly -- Impact of Optimized Field Operations AB, AC and AB + CD in Scalar Multiplication over Binary Elliptic Curve / Christophe Negre, Jean-Marc Robert
An Attack on RSA Using LSBs of Multiples of the Prime Factors / Abderrahmane Nitaj -- Modification and Optimisation of an ElGamal-Based PVSS Scheme / Kun Peng -- Studying a Range Proof Technique -- Exception and Optimisation / Kun Peng, Li Yi -- Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model / Duong Hieu Phan, Viet Cuong Trinh -- Fast Software Encryption Attacks on AES / David Gstir, Martin Schläffer -- Sieving for Shortest Vectors in Ideal Lattices / Michael Schneider -- An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection / Sebastian Staamann -- A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers / Fabian van den Broek, Erik Poll -- On the Expansion Length Of Triple-Base Number Systems / Wei Yu, Kunpeng Wang, Bao Li, Song Tian -- Triple-Base Number System for Scalar Multiplication / Wei Yu, Kunpeng Wang, Bao Li, Song Tian
Summary This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013. The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices
Analysis computerwetenschappen
computer sciences
numerieke methoden
numerical methods
computertechnieken
computer techniques
informatietheorie
information theory
gegevensbeheer
data management
computational science
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes International conference proceedings
Includes author index
Bibliography Includes bibliographical references and author index
Notes Print version record
Subject Data encryption (Computer science) -- Congresses
Computer security.
Computer Security
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Youssef, Amr M., editor
Nitaj, Abderrahmane, editor
Hassanien, Aboul Ella, editor
ISBN 9783642385537
3642385532
3642385524
9783642385520
Other Titles AFRICACRYPT 2013