Progress in cryptology -- AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings /
Saved in:

Progress in cryptology -- AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings /

Bibliographic Details
Corporate Authors: International Conference on Cryptology in Africa Ifrane (Meknès), Morocco), SpringerLink (Online service)
Other Authors: Mitrokotsa, Aikaterini, Vaudenay, Serge
Format: Online Conference Proceeding Book
Language:English
Published: Berlin ; New York : Springer, c2012.
Series:Lecture notes in computer science ; 7374.
LNCS sublibrary. Security and cryptology.
Subjects:
Access:Online version
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Batch Verification of ECDSA Signatures / Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur and Debojyoti Bhattacharya, et al.
  • Extended Security Arguments for Signature Schemes / Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo and Pierre-Louis Cayrel
  • Sanitizable Signatures with Several Signers and Sanitizers / Sébastien Canard, Amandine Jambert and Roch Lescuyer
  • Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator / Jingjing Wang, Xiangxue Li, Kefei Chen and Wenzheng Zhang
  • Fuzzy Vault for Multiple Users / Julien Bringer, Hervé Chabanne and Mélanie Favre
  • Bounds and Constructions for 1-Round (0,[delta])-Secure Message Transmission against Generalized Adversary / Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin
  • Improving the Performance of the SYND Stream Cipher / Mohammed Meziani, Gerhard Hoffmann and Pierre-Louis Cayrel
  • Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT / Jiazhe Chen, Meiqin Wang and Bart Preneel
  • Three-Subset Meet-in-the-Middle Attack on Reduced XTEA / Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama and Kazuo Ohta
  • Differential Cryptanalysis of Reduced-Round ICEBERG / Yue Sun, Meiqin Wang, Shujia Jiang and Qiumei Sun
  • Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices / Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse and Sebastiaan Indesteege, et al.
  • Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important / Enrico Thomae and Christopher Wolf
  • A Complementary Analysis of the (s)YZ and DIKE Protocols / Augustin P. Sarr and Philippe Elbaz-Vincent
  • A New Attack on RSA and CRT-RSA / Abderrahmane Nitaj
  • Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption / Frederik Armknecht, Stefan Katzenbeisser and Andreas Peter
  • The Collision Security of MDC-4 / Ewan Fleischmann, Christian Forler and Stefan Lucks
  • SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks / Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo and Thomas Peyrin, et al.
  • Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein / Elena Andreeva, Bart Mennink, Bart Preneel and Marjan Škrobot
  • The GLUON Family: A Lightweight Hash Function Family Based on FCSRs / Thierry P. Berger, Joffrey D'Hayer, Kevin Marquet, Marine Minier and Gaël Thomas
  • SHA-3 on ARM11 Processors / Peter Schwabe, Bo-Yin Yang and Shang-Yi Yang
  • Improved Fixed-Base Comb Method for Fast Scalar Multiplication / Nashwa A. F. Mohamed, Mohsin H. A. Hashim and Michael Hutter
  • Optimal First-Order Masking with Linear and Non-linear Bijections / Houssem Maghrebi, Claude Carlet, Sylvain Guilley and Jean-Luc Danger
  • Size-Hiding in Private Set Intersection: Existential Results and Constructions / Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo and Claudio Soriente
  • Round-Optimal Black-Box Statistically Binding Selective-Opening Secure Commitments / David Xiao
  • Stream Ciphers, a Perspective / Willi Meier
  • Black-Box Reductions and Separations in Cryptography / Marc Fischlin.