default search action
5. AFRICACRYPT 2012: Ifrance, Morocco
- Aikaterini Mitrokotsa, Serge Vaudenay:
Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings. Lecture Notes in Computer Science 7374, Springer 2012, ISBN 978-3-642-31409-4
Signature Schemes
- Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer:
Batch Verification of ECDSA Signatures. 1-18 - Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel:
Extended Security Arguments for Signature Schemes. 19-34 - Sébastien Canard, Amandine Jambert, Roch Lescuyer:
Sanitizable Signatures with Several Signers and Sanitizers. 35-52
Stream Ciphers
- Jingjing Wang, Xiangxue Li, Kefei Chen, Wenzheng Zhang:
Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator. 53-66
Applications of Information Theory
- Julien Bringer, Hervé Chabanne, Mélanie Favre:
Fuzzy Vault for Multiple Users. 67-81 - Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin:
Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized Adversary. 82-98 - Mohammed Meziani, Gerhard Hoffmann, Pierre-Louis Cayrel:
Improving the Performance of the SYND Stream Cipher. 99-116
Block Ciphers
- Jiazhe Chen, Meiqin Wang, Bart Preneel:
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT. 117-137 - Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta:
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA. 138-154 - Yue Sun, Meiqin Wang, Shujia Jiang, Qiumei Sun:
Differential Cryptanalysis of Reduced-Round ICEBERG. 155-171 - Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel:
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices. 172-187
Network Security Protocols
- Enrico Thomae, Christopher Wolf:
Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important. 188-202 - Augustin P. Sarr, Philippe Elbaz-Vincent:
A Complementary Analysis of the (s)YZ and DIKE Protocols. 203-220
Public-Key Cryptography
- Abderrahmane Nitaj:
A New Attack on RSA and CRT-RSA. 221-233 - Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter:
Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption. 234-251
Cryptanalysis of Hash Functions
- Ewan Fleischmann, Christian Forler, Stefan Lucks:
The Collision Security of MDC-4. 252-269 - Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan:
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks. 270-286 - Elena Andreeva, Bart Mennink, Bart Preneel, Marjan Skrobot:
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein. 287-305
Hash Functions: Design and Implementation
- Thierry P. Berger, Joffrey D'Hayer, Kevin Marquet, Marine Minier, Gaël Thomas:
The GLUON Family: A Lightweight Hash Function Family Based on FCSRs. 306-323 - Peter Schwabe, Bo-Yin Yang, Shang-Yi Yang:
SHA-3 on ARM11 Processors. 324-341
Algorithms for Public-Key Cryptography
- Nashwa A. F. Mohamed, Mohsin H. A. Hashim, Michael Hutter:
Improved Fixed-Base Comb Method for Fast Scalar Multiplication. 342-359 - Houssem Maghrebi, Claude Carlet, Sylvain Guilley, Jean-Luc Danger:
Optimal First-Order Masking with Linear and Non-linear Bijections. 360-377
Cryptographic Protocols
- Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo, Claudio Soriente:
Size-Hiding in Private Set Intersection: Existential Results and Constructions. 378-394 - David Xiao:
Round-Optimal Black-Box Statistically Binding Selective-Opening Secure Commitments. 395-411
Invited Talks
- Willi Meier:
Stream Ciphers, a Perspective. 412 - Marc Fischlin:
Black-Box Reductions and Separations in Cryptography. 413-422
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.