Progress in cryptology -- AFRICACRYPT 2012 : 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings /
Saved in:
Meeting name: | International Conference on Cryptology in Africa (5th : 2012 : Ifrane (Meknès), Morocco) |
---|---|
Imprint: | Berlin ; New York : Springer, ©2012. |
Description: | 1 online resource (xi, 424 pages) : illustrations. |
Language: | English |
Series: | Lecture notes in computer science, 1611-3349 ; 7374 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 7374. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11076999 |
Table of Contents:
- Batch Verification of ECDSA Signatures / Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur and Debojyoti Bhattacharya, et al.
- Extended Security Arguments for Signature Schemes / Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo and Pierre-Louis Cayrel
- Sanitizable Signatures with Several Signers and Sanitizers / Sébastien Canard, Amandine Jambert and Roch Lescuyer
- Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator / Jingjing Wang, Xiangxue Li, Kefei Chen and Wenzheng Zhang
- Fuzzy Vault for Multiple Users / Julien Bringer, Hervé Chabanne and Mélanie Favre
- Bounds and Constructions for 1-Round (0, [delta])-Secure Message Transmission against Generalized Adversary / Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin
- Improving the Performance of the SYND Stream Cipher / Mohammed Meziani, Gerhard Hoffmann and Pierre-Louis Cayrel
- Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT / Jiazhe Chen, Meiqin Wang and Bart Preneel
- Three-Subset Meet-in-the-Middle Attack on Reduced XTEA / Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama and Kazuo Ohta
- Differential Cryptanalysis of Reduced-Round ICEBERG / Yue Sun, Meiqin Wang, Shujia Jiang and Qiumei Sun
- Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices / Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse and Sebastiaan Indesteege, et al.
- Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important / Enrico Thomae and Christopher Wolf
- A Complementary Analysis of the (s)YZ and DIKE Protocols / Augustin P. Sarr and Philippe Elbaz-Vincent
- A New Attack on RSA and CRT-RSA / Abderrahmane Nitaj
- Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption / Frederik Armknecht, Stefan Katzenbeisser and Andreas Peter
- The Collision Security of MDC-4 / Ewan Fleischmann, Christian Forler and Stefan Lucks
- SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks / Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo and Thomas Peyrin, et al.
- Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein / Elena Andreeva, Bart Mennink, Bart Preneel and Marjan Škrobot
- The GLUON Family: A Lightweight Hash Function Family Based on FCSRs / Thierry P. Berger, Joffrey D'Hayer, Kevin Marquet, Marine Minier and Gaël Thomas
- SHA-3 on ARM11 Processors / Peter Schwabe, Bo-Yin Yang and Shang-Yi Yang
- Improved Fixed-Base Comb Method for Fast Scalar Multiplication / Nashwa A.F. Mohamed, Mohsin H.A. Hashim and Michael Hutter
- Optimal First-Order Masking with Linear and Non-linear Bijections / Houssem Maghrebi, Claude Carlet, Sylvain Guilley and Jean-Luc Danger
- Size-Hiding in Private Set Intersection: Existential Results and Constructions / Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo and Claudio Soriente
- Round-Optimal Black-Box Statistically Binding Selective-Opening Secure Commitments / David Xiao
- Stream Ciphers, a Perspective / Willi Meier
- Black-Box Reductions and Separations in Cryptography / Marc Fischlin.