Book Volume 7374 2012

Progress in Cryptology - AFRICACRYPT 2012

5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings

Editors:

ISBN: 978-3-642-31409-4 (Print) 978-3-642-31410-0 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Signature Schemes

    1. Chapter

      Pages 1-18

      Batch Verification of ECDSA Signatures

    2. Chapter

      Pages 19-34

      Extended Security Arguments for Signature Schemes

    3. Chapter

      Pages 35-52

      Sanitizable Signatures with Several Signers and Sanitizers

  3. Stream Ciphers

    1. Chapter

      Pages 53-66

      Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator

  4. Applications of Information Theory

    1. Chapter

      Pages 67-81

      Fuzzy Vault for Multiple Users

    2. Chapter

      Pages 82-98

      Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary

    3. Chapter

      Pages 99-116

      Improving the Performance of the SYND Stream Cipher

  5. Block Ciphers

    1. Chapter

      Pages 117-137

      Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT

    2. Chapter

      Pages 138-154

      Three-Subset Meet-in-the-Middle Attack on Reduced XTEA

    3. Chapter

      Pages 155-171

      Differential Cryptanalysis of Reduced-Round ICEBERG

    4. Chapter

      Pages 172-187

      Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

  6. Network Security Protocols

    1. Chapter

      Pages 188-202

      Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important

    2. Chapter

      Pages 203-220

      A Complementary Analysis of the (s)YZ and DIKE Protocols

  7. Public-Key Cryptography

    1. Chapter

      Pages 221-233

      A New Attack on RSA and CRT-RSA

    2. Chapter

      Pages 234-251

      Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption

  8. Cryptanalysis of Hash Functions

    1. Chapter

      Pages 252-269

      The Collision Security of MDC-4

    2. Chapter

      Pages 270-286

      SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks

    3. Chapter

      Pages 287-305

      Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein

  9. Hash Functions: Design and Implementation

    1. Chapter

      Pages 306-323

      The GLUON Family: A Lightweight Hash Function Family Based on FCSRs

    2. Chapter

      Pages 324-341

      SHA-3 on ARM11 Processors

previous Page of 2