skip to content
Progress in cryptology -- AFRICACRYPT 2013 : 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, proceedings Preview this item
ClosePreview this item
Checking...

Progress in cryptology -- AFRICACRYPT 2013 : 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, proceedings

Author: Amr M Youssef; Abderrahmane Nitaj; Aboul Ella Hassanien
Publisher: Berlin : Springer, [2013] ©2013
Series: Lecture notes in computer science, 7918.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:
This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013. The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference proceedings
Congresses
Additional Physical Format: Print version:
Progress in cryptology -- africacrypt 2013.
[S.l.] : Springer-Verlag Berlin An, 2013
(OCoLC)841520781
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Amr M Youssef; Abderrahmane Nitaj; Aboul Ella Hassanien
ISBN: 9783642385537 3642385532 3642385524 9783642385520
OCLC Number: 843353485
Notes: International conference proceedings.
Includes author index.
Description: 1 online resource (xiii, 451 pages) : illustrations
Contents: Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting / Carlos Aguilar Melchor, Slim Bettaieb --
GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field / Utsab Bose, Anup Kumar Bhattacharya --
On Constructions of Involutory MDS Matrices / Kishan Chand Gupta, Indranil Ghosh Ray --
Homomorphic Encryption with Access Policies: Characterization and New Constructions / Michael Clear, Arthur Hughes, Hitesh Tewari --
Brandt's Fully Private Auction Protocol Revisited / Jannik Dreier, Jean-Guillaume Dumas --
HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems / Alexandre Duc, Serge Vaudenay --
Attacking AES Using Bernstein's Attack on Modern Processors / Hassan Aly, Mohammed ElGayyar --
Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model / Philippe Guillot, Abdelkrim Nimour --
NaCl on 8-Bit AVR Microcontrollers / Michael Hutter, Peter Schwabe --
W-OTS+ --
Shorter Signatures for Hash-Based Signature Schemes / Andreas Hülsing. New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs / Ayesha Khalid, Goutam Paul --
Cryptanalysis of AES and Camellia with Related S-boxes / Marco Macchetti --
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 / Subhamoy Maitra, Goutam Paul, Santanu Sarkar --
Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design / Louis Goubin, Ange Martinelli, Matthieu Walle --
Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority / Isheeta Nargis, Payman Mohassel, Wayne Eberly --
Impact of Optimized Field Operations AB, AC and AB + CD in Scalar Multiplication over Binary Elliptic Curve / Christophe Negre, Jean-Marc Robert --
An Attack on RSA Using LSBs of Multiples of the Prime Factors / Abderrahmane Nitaj --
Modification and Optimisation of an ElGamal-Based PVSS Scheme / Kun Peng --
Studying a Range Proof Technique --
Exception and Optimisation / Kun Peng, Li Yi. Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model / Duong Hieu Phan, Viet Cuong Trinh --
Fast Software Encryption Attacks on AES / David Gstir, Martin Schläffer --
Sieving for Shortest Vectors in Ideal Lattices / Michael Schneider --
An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection / Sebastian Staamann --
A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers / Fabian van den Broek, Erik Poll --
On the Expansion Length Of Triple-Base Number Systems / Wei Yu, Kunpeng Wang, Bao Li, Song Tian --
Triple-Base Number System for Scalar Multiplication / Louis Goubin, Ange Martinelli, Matthieu Walle --
Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority / Isheeta Nargis, Payman Mohassel, Wayne Eberly --
Impact of Optimized Field Operations AB, AC and AB + CD in Scalar Multiplication over Binary Elliptic Curve / Christophe Negre, Jean-Marc Robert. An Attack on RSA Using LSBs of Multiples of the Prime Factors / Abderrahmane Nitaj --
Modification and Optimisation of an ElGamal-Based PVSS Scheme / Kun Peng --
Studying a Range Proof Technique --
Exception and Optimisation / Kun Peng, Li Yi --
Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model / Duong Hieu Phan, Viet Cuong Trinh --
Fast Software Encryption Attacks on AES / David Gstir, Martin Schläffer --
Sieving for Shortest Vectors in Ideal Lattices / Michael Schneider --
An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection / Sebastian Staamann --
A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers / Fabian van den Broek, Erik Poll --
On the Expansion Length Of Triple-Base Number Systems / Wei Yu, Kunpeng Wang, Bao Li, Song Tian --
Triple-Base Number System for Scalar Multiplication / Wei Yu, Kunpeng Wang, Bao Li, Song Tian.
Series Title: Lecture notes in computer science, 7918.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: AFRICACRYPT 2013
Responsibility: Amr Youssef, Abderrahmane Nitaj, Aboul Ella Hassanien (eds.).
More information:

Abstract:

This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013. The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/843353485>
library:oclcnum"843353485"
library:placeOfPublication
owl:sameAs<info:oclcnum/843353485>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013. The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1371208594>
schema:genre"Conference proceedings."@en
schema:genre"Conference proceedings"@en
schema:genre"Electronic books."@en
schema:inLanguage"en"
schema:name"Progress in cryptology -- AFRICACRYPT 2013 : 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013, proceedings"@en
schema:name"AFRICACRYPT 2013"@en
schema:url<http://dx.doi.org/10.1007/978-3-642-38553-7>
schema:url
schema:workExample
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.