Progress in Cryptology – AFRICACRYPT 2013

6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings

  • Amr Youssef
  • Abderrahmane Nitaj
  • Aboul Ella Hassanien
Conference proceedings AFRICACRYPT 2013

DOI: 10.1007/978-3-642-38553-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7918)

Table of contents (26 papers)

  1. Front Matter
  2. Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting
    Carlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit
    Pages 1-25
  3. GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field
    Utsab Bose, Anup Kumar Bhattacharya, Abhijit Das
    Pages 26-42
  4. On Constructions of Involutory MDS Matrices
    Kishan Chand Gupta, Indranil Ghosh Ray
    Pages 43-60
  5. Homomorphic Encryption with Access Policies: Characterization and New Constructions
    Michael Clear, Arthur Hughes, Hitesh Tewari
    Pages 61-87
  6. Brandt’s Fully Private Auction Protocol Revisited
    Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade
    Pages 88-106
  7. Attacking AES Using Bernstein’s Attack on Modern Processors
    Hassan Aly, Mohammed ElGayyar
    Pages 127-139
  8. Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model
    Philippe Guillot, Abdelkrim Nimour, Duong Hieu Phan, Viet Cuong Trinh
    Pages 140-155
  9. NaCl on 8-Bit AVR Microcontrollers
    Michael Hutter, Peter Schwabe
    Pages 156-172
  10. New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs
    Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
    Pages 189-207
  11. New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4
    Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann, Willi Meier
    Pages 222-239
  12. Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design
    Louis Goubin, Ange Martinelli, Matthieu Walle
    Pages 240-259
  13. Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority
    Isheeta Nargis, Payman Mohassel, Wayne Eberly
    Pages 260-278

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013.
The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices.

Keywords

attacks digital signatures hash functions homomorphic encryption stream ciphers

Editors and affiliations

  • Amr Youssef
    • 1
  • Abderrahmane Nitaj
    • 2
  • Aboul Ella Hassanien
    • 3
  1. 1.Concordia Institute for Information Systems EngineeringConcordia UniversityMontrealCanada
  2. 2.Laboratoire de Mathématiques Nicolas OresmeUniversité de Caen Basse-NormandieCaenFrance
  3. 3.Department of Information TechnologyCairo UniversityCairoEgypt

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38552-0
  • Online ISBN 978-3-642-38553-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349