default search action
3. AFRICACRYPT 2010: Stellenbosch, South Africa
- Daniel J. Bernstein, Tanja Lange:
Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings. Lecture Notes in Computer Science 6055, Springer 2010, ISBN 978-3-642-12677-2
Signatures
- Sven Schäge, Jörg Schwenk:
A New RSA-Based Signature Scheme. 1-15 - Georg Fuchsbauer, Damien Vergnaud:
Fair Blind Signatures without Random Oracles. 16-33 - Markus Rückert, Dominique Schröder:
Fair Partially Blind Signatures. 34-51
Attacks
- Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, Bart Preneel:
Parallel Shortest Lattice Vector Enumeration on Graphics Cards. 52-68 - Johannes Buchmann, Daniel Cabarcas, Jintai Ding, Mohamed Saied Emam Mohamed:
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2. 69-81 - Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta:
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits. 82-99
Protocols
- Björn Terelius, Douglas Wikström:
Proofs of Restricted Shuffles. 100-113 - Kun Peng, Feng Bao:
Batch Range Proof for Practical Small Ranges. 114-130 - Alfredo Rial, Bart Preneel:
Optimistic Fair Priced Oblivious Transfer. 131-147
Networks
- Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsutomu Matsumoto:
Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. 148-165 - Yvo Desmedt, Stelios Erotokritou, Reihaneh Safavi-Naini:
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes. 166-183 - Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience. 184-202
Elliptic Curves
- Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Avoiding Full Extension Field Arithmetic in Pairing Computations. 203-224 - Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe:
ECC2K-130 on Cell CPUs. 225-242
Side-Channel Attacks and Fault Attacks
- M. Abdelaziz Elaabid, Sylvain Guilley:
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator. 243-260 - Aleksandar Kircanski, Amr M. Youssef:
Differential Fault Analysis of HC-128. 261-278 - Marcel Medwed, François-Xavier Standaert, Johann Großschädl, Francesco Regazzoni:
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices. 279-296
Public-Key Encryption
- Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, David Pointcheval:
Strong Cryptography from Weak Secrets. 297-315 - Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng:
Efficient Unidirectional Proxy Re-Encryption. 316-332 - David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder:
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. 333-350
Keys and PUFs
- Michel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval:
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. 351-368 - Boris Skoric:
Quantum Readout of Physical Unclonable Functions. 369-386
Ciphers and Hash Functions
- Huihui Yap, Khoongming Khoo, Axel Poschmann:
Parallelizing the Camellia and SMS4 Block Ciphers. 387-406 - Shahram Khazaei, Simon Knellwolf, Willi Meier, Deian Stefan:
Improved Linear Differential Attacks on CubeHash. 407-418 - Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. 419-436
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.