Progress in Cryptology - AFRICACRYPT 2017

9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings

  • Marc Joye
  • Abderrahmane Nitaj
Conference proceedings AFRICACRYPT 2017
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10239)

Table of contents

  1. Front Matter
    Pages I-X
  2. Cryptographic Schemes

    1. Front Matter
      Pages 1-1
    2. Mohamed Saied Emam Mohamed, Albrecht Petzoldt
      Pages 3-20
  3. Side-Channel Analysis

    1. Front Matter
      Pages 59-59
    2. Stjepan Picek, Annelie Heuser, Alan Jovic, Axel Legay
      Pages 61-78
    3. Milena Djukanovic, Davide Bellizia, Giuseppe Scotti, Alessandro Trifiletti
      Pages 79-94
  4. Differential Cryptanalysis

    1. Front Matter
      Pages 115-115
    2. Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef
      Pages 117-134
    3. Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef
      Pages 135-146
  5. Applications

    1. Front Matter
      Pages 147-147
    2. Tushar Kanti Saha, Takeshi Koshiba
      Pages 149-164
    3. Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
      Pages 184-201
  6. Number Theory

    1. Front Matter
      Pages 203-203
    2. Michel Seck, Hortense Boudjou, Nafissatou Diarra, Ahmed Youssef Ould Cheikh Khlil
      Pages 205-222
  7. Back Matter
    Pages 231-231

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017.

The 13 papers presented in this book were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptographic schemes, side-channel analysis, differential cryptanalysis, applications, and number theory.

Keywords

cryptography side-channel attacks elliptic curve-based cryptography hash functions cryptanalysis ring signatures machine learning techniques formal security analysis security protocols key management hardware attacks and countermeasures symmetric cryptography impossible differential information-theoretic techniques mathematical foundations of cryptography hardware attacks and countermeasures lossy encryption symmetric groups oblivious transfer query processing

Editors and affiliations

  • Marc Joye
    • 1
  • Abderrahmane Nitaj
    • 2
  1. 1.NXP Semiconductors San JoseUSA
  2. 2.University of Caen CaenFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-57339-7
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-57338-0
  • Online ISBN 978-3-319-57339-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349