Progress in Cryptology – AFRICACRYPT 2010

Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings

  • Daniel J. Bernstein
  • Tanja Lange
Conference proceedings AFRICACRYPT 2010

DOI: 10.1007/978-3-642-12678-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6055)

Table of contents (25 papers)

  1. Front Matter
  2. Signatures

    1. A New RSA-Based Signature Scheme
      Sven Schäge, Jörg Schwenk
      Pages 1-15
    2. Fair Blind Signatures without Random Oracles
      Georg Fuchsbauer, Damien Vergnaud
      Pages 16-33
    3. Fair Partially Blind Signatures
      Markus Rückert, Dominique Schröder
      Pages 34-51
  3. Attacks

    1. Parallel Shortest Lattice Vector Enumeration on Graphics Cards
      Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, Bart Preneel
      Pages 52-68
    2. Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over \(\mathbb{F}_2\)
      Johannes Buchmann, Daniel Cabarcas, Jintai Ding, Mohamed Saied Emam Mohamed
      Pages 69-81
    3. Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits
      Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta
      Pages 82-99
  4. Protocols

    1. Proofs of Restricted Shuffles
      Björn Terelius, Douglas Wikström
      Pages 100-113
    2. Batch Range Proof for Practical Small Ranges
      Kun Peng, Feng Bao
      Pages 114-130
    3. Optimistic Fair Priced Oblivious Transfer
      Alfredo Rial, Bart Preneel
      Pages 131-147
  5. Networks

    1. Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
      Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsutomu Matsumoto
      Pages 148-165
  6. Elliptic Curves

    1. Avoiding Full Extension Field Arithmetic in Pairing Computations
      Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong
      Pages 203-224
    2. ECC2K-130 on Cell CPUs
      Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe
      Pages 225-242
  7. Side-Channel Attacks and Fault Attacks

    1. Differential Fault Analysis of HC-128
      Aleksandar Kircanski, Amr M. Youssef
      Pages 261-278
    2. Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
      Marcel Medwed, François-Xavier Standaert, Johann Großschädl, Francesco Regazzoni
      Pages 279-296
  8. Public-Key Encryption

    1. Strong Cryptography from Weak Secrets
      Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, David Pointcheval
      Pages 297-315
    2. Efficient Unidirectional Proxy Re-Encryption
      Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng
      Pages 316-332

About these proceedings


Proxy authentication complexity cryptoanalysis cryptography cryptology elliptic curves encryption hardware encryption hash function networks security

Editors and affiliations

  • Daniel J. Bernstein
    • 1
  • Tanja Lange
    • 2
  1. 1.Department of Computer ScienceUniversity of Illinois at ChicagoChicagoUSA
  2. 2.Department of Mathematics and Computer ScienceEindhoven University of TechnologyEindhovenThe Netherlands

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-12677-2
  • Online ISBN 978-3-642-12678-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349