Progress in Cryptology – AFRICACRYPT 2009

Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings

  • Bart Preneel
Conference proceedings AFRICACRYPT 2009

DOI: 10.1007/978-3-642-02384-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5580)

Table of contents

  1. Front Matter
  2. Hash Functions

    1. Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen
      Pages 14-28
    2. Florian Mendel
      Pages 29-40
  3. Block Ciphers

    1. Joana Treger, Jacques Patarin
      Pages 41-59
    2. Marine Minier, Raphael C. -W. Phan, Benjamin Pousse
      Pages 60-76
  4. Asymmetric Encryption

    1. Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani
      Pages 77-97
    2. Abderrahmane Nitaj
      Pages 98-115
  5. Digital Signatures

    1. Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
      Pages 116-134
    2. David Galindo, Flavio D. Garcia
      Pages 135-148
    3. Go Ohtake, Arisa Fujii, Goichiro Hanaoka, Kazuto Ogawa
      Pages 149-166
    4. İlker Nadi Bozkurt, Kamer Kaya, Ali Aydın Selçuk
      Pages 167-178
  6. Asymmetric Encryption and Anonymity

    1. Pooya Farshim, Bogdan Warinschi
      Pages 179-197
    2. Siamak F. Shahandashti, Reihaneh Safavi-Naini
      Pages 198-216
  7. Key Agreement Protocols

    1. Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval
      Pages 254-271
  8. Cryptographic Protocols

    1. Carmine Ventre, Ivan Visconti
      Pages 287-304
    2. Julien Bringer, Hervé Chabanne
      Pages 305-322

About these proceedings


This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009.

The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered are hash functions, block ciphers, asymmetric encryption, digital signatures, asymmetric encryption and anonymity, key agreement protocols, cryptographic protocols, efficient implementations, and implementation attacks.


AES DES Information anonymity authenticated encryption authentication biometrics block cipher cryptanalysis cryptographic protocols cryptography elliptic curves hash functions keyed hash functions lightweight cryptography

Editors and affiliations

  • Bart Preneel
    • 1
  1. 1.Dept. Electrical Engineering-ESAT/COSICKatholieke Universiteit LeuvenLeuvenBelgium

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-02383-5
  • Online ISBN 978-3-642-02384-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349