Progress in Cryptology – AFRICACRYPT 2013

6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings

Editors:

ISBN: 978-3-642-38552-0 (Print) 978-3-642-38553-7 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-25

    Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting

  3. No Access

    Book Chapter

    Pages 26-42

    GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field

  4. No Access

    Book Chapter

    Pages 43-60

    On Constructions of Involutory MDS Matrices

  5. No Access

    Book Chapter

    Pages 61-87

    Homomorphic Encryption with Access Policies: Characterization and New Constructions

  6. No Access

    Book Chapter

    Pages 88-106

    Brandt’s Fully Private Auction Protocol Revisited

  7. No Access

    Book Chapter

    Pages 107-126

    HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems

  8. No Access

    Book Chapter

    Pages 127-139

    Attacking AES Using Bernstein’s Attack on Modern Processors

  9. No Access

    Book Chapter

    Pages 140-155

    Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model

  10. No Access

    Book Chapter

    Pages 156-172

    NaCl on 8-Bit AVR Microcontrollers

  11. No Access

    Book Chapter

    Pages 173-188

    W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes

  12. No Access

    Book Chapter

    Pages 189-207

    New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs

  13. No Access

    Book Chapter

    Pages 208-221

    Cryptanalysis of AES and Camellia with Related S-boxes

  14. No Access

    Book Chapter

    Pages 222-239

    New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4

  15. No Access

    Book Chapter

    Pages 240-259

    Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design

  16. No Access

    Book Chapter

    Pages 260-278

    Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority

  17. No Access

    Book Chapter

    Pages 279-296

    Impact of Optimized Field Operations AB,AC and AB + CD in Scalar Multiplication over Binary Elliptic Curve

  18. No Access

    Book Chapter

    Pages 297-310

    An Attack on RSA Using LSBs of Multiples of the Prime Factors

  19. No Access

    Book Chapter

    Pages 311-327

    Modification and Optimisation of an ElGamal-Based PVSS Scheme

  20. No Access

    Book Chapter

    Pages 328-341

    Studying a Range Proof Technique — Exception and Optimisation

  21. No Access

    Book Chapter

    Pages 342-358

    Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model

previous Page of 2