Skip to main content
  • Conference proceedings
  • © 2014

Progress in Cryptology – AFRICACRYPT 2014

7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8469)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): AFRICACRYPT: International Conference on Cryptology in Africa

Conference proceedings info: AFRICACRYPT 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. New Results for Rank-Based Cryptography

    • Philippe Gaborit, Olivier Ruatta, Julien Schrek, Gilles Zémor
    Pages 1-12
  3. Public-Key Cryptography

    1. Proxy Re-Encryption Scheme Supporting a Selection of Delegatees

      • Julien Devigne, Eleonora Guerrini, Fabien Laguillaumie
      Pages 13-30
    2. Trapdoor Privacy in Asymmetric Searchable Encryption Schemes

      • Afonso Arriaga, Qiang Tang, Peter Ryan
      Pages 31-50
    3. Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited

      • Kaoru Kurosawa, Le Trieu Phong
      Pages 51-68
  4. Hash Functions

    1. Differential Biases in Reduced-Round Keccak

      • Sourav Das, Willi Meier
      Pages 69-87
    2. Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry

      • Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury
      Pages 88-108
    3. Preimage Attacks on Reduced-Round Stribog

      • Riham AlTawy, Amr M. Youssef
      Pages 109-125
  5. Secret-Key Cryptanalysis

    1. Breaking the IOC Authenticated Encryption Mode

      • Paul Bottinelli, Reza Reyhanitabar, Serge Vaudenay
      Pages 126-135
    2. New Treatment of the BSW Sampling and Its Applications to Stream Ciphers

      • Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi
      Pages 136-146
    3. Multidimensional Zero-Correlation Linear Cryptanalysis of E2

      • Long Wen, Meiqin Wang, Andrey Bogdanov
      Pages 147-164
  6. Public-Key Cryptanalysis and Number Theory

    1. Further Improvement of Factoring RSA Moduli with Implicit Hint

      • Liqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie
      Pages 165-177
    2. New Attacks on the RSA Cryptosystem

      • Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig
      Pages 178-198
  7. Hardware Implementation

    1. Minimizing S-Boxes in Hardware by Utilizing Linear Transformations

      • Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Marc Stöttinger
      Pages 235-250
    2. Efficient Masked S-Boxes Processing – A Step Forward –

      • Vincent Grosso, Emmanuel Prouff, François-Xavier Standaert
      Pages 251-266
    3. A More Efficient AES Threshold Implementation

      • Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
      Pages 267-284
  8. Protocols

    1. Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum

      • Kazuma Ohara, Kazuo Ohta, Koutarou Suzuki, Kazuki Yoneyama
      Pages 285-299
    2. Position-Based Cryptography from Noisy Channels

      • Stefan Dziembowski, Maciej Zdanowicz
      Pages 300-317

Other Volumes

  1. Progress in Cryptology – AFRICACRYPT 2014

About this book

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICA CRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africa crypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key Cryptography, Hash Functions, Secret-Key Cryptanalysis, Number Theory, Hardware Implementation, Protocols and Lattice-based Cryptography.

Editors and Affiliations

  • Computer Science Department, Ecole Normale Supérieure, Paris, France

    David Pointcheval, Damien Vergnaud

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access