Progress in cryptology -- AFRICACRYPT 2012 : 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings /

Saved in:
Bibliographic Details
Meeting name:International Conference on Cryptology in Africa (5th : 2012 : Ifrane (Meknès), Morocco)
Imprint:Berlin ; New York : Springer, ©2012.
Description:1 online resource (xi, 424 pages) : illustrations.
Language:English
Series:Lecture notes in computer science, 1611-3349 ; 7374
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7374.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11076999
Hidden Bibliographic Details
Varying Form of Title:AFRICACRYPT 2012
Other authors / contributors:Mitrokotsa, Aikaterini.
Vaudenay, Serge.
ISBN:9783642314100
3642314104
3642314090
9783642314094
9783642314094
Notes:Includes bibliographical references and author index.
Online resource; title from PDF title page (SpringerLink, viewed Aug. 13, 2012).
Summary:Annotation This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.
Other form:Printed edition: 9783642314094
Standard no.:10.1007/978-3-642-31410-0
Table of Contents:
  • Batch Verification of ECDSA Signatures / Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur and Debojyoti Bhattacharya, et al.
  • Extended Security Arguments for Signature Schemes / Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo and Pierre-Louis Cayrel
  • Sanitizable Signatures with Several Signers and Sanitizers / Sébastien Canard, Amandine Jambert and Roch Lescuyer
  • Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator / Jingjing Wang, Xiangxue Li, Kefei Chen and Wenzheng Zhang
  • Fuzzy Vault for Multiple Users / Julien Bringer, Hervé Chabanne and Mélanie Favre
  • Bounds and Constructions for 1-Round (0, [delta])-Secure Message Transmission against Generalized Adversary / Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin
  • Improving the Performance of the SYND Stream Cipher / Mohammed Meziani, Gerhard Hoffmann and Pierre-Louis Cayrel
  • Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT / Jiazhe Chen, Meiqin Wang and Bart Preneel
  • Three-Subset Meet-in-the-Middle Attack on Reduced XTEA / Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama and Kazuo Ohta
  • Differential Cryptanalysis of Reduced-Round ICEBERG / Yue Sun, Meiqin Wang, Shujia Jiang and Qiumei Sun
  • Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices / Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse and Sebastiaan Indesteege, et al.
  • Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important / Enrico Thomae and Christopher Wolf
  • A Complementary Analysis of the (s)YZ and DIKE Protocols / Augustin P. Sarr and Philippe Elbaz-Vincent
  • A New Attack on RSA and CRT-RSA / Abderrahmane Nitaj
  • Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption / Frederik Armknecht, Stefan Katzenbeisser and Andreas Peter
  • The Collision Security of MDC-4 / Ewan Fleischmann, Christian Forler and Stefan Lucks
  • SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks / Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo and Thomas Peyrin, et al.
  • Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein / Elena Andreeva, Bart Mennink, Bart Preneel and Marjan Škrobot
  • The GLUON Family: A Lightweight Hash Function Family Based on FCSRs / Thierry P. Berger, Joffrey D'Hayer, Kevin Marquet, Marine Minier and Gaël Thomas
  • SHA-3 on ARM11 Processors / Peter Schwabe, Bo-Yin Yang and Shang-Yi Yang
  • Improved Fixed-Base Comb Method for Fast Scalar Multiplication / Nashwa A.F. Mohamed, Mohsin H.A. Hashim and Michael Hutter
  • Optimal First-Order Masking with Linear and Non-linear Bijections / Houssem Maghrebi, Claude Carlet, Sylvain Guilley and Jean-Luc Danger
  • Size-Hiding in Private Set Intersection: Existential Results and Constructions / Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo and Claudio Soriente
  • Round-Optimal Black-Box Statistically Binding Selective-Opening Secure Commitments / David Xiao
  • Stream Ciphers, a Perspective / Willi Meier
  • Black-Box Reductions and Separations in Cryptography / Marc Fischlin.