Progress in Cryptology – AFRICACRYPT 2011

4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings

  • Abderrahmane Nitaj
  • David Pointcheval
Conference proceedings AFRICACRYPT 2011
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6737)

Table of contents

  1. Front Matter
  2. Protocols

    1. Jake Loftus, Nigel P. Smart
      Pages 1-20
    2. Carolin Lunemann, Jesper Buus Nielsen
      Pages 21-40
    3. Hiroaki Anada, Seiko Arita
      Pages 59-76
  3. Cryptanalysis

    1. Stéphanie Kerckhof, Baudoin Collard, Franc̨ois-Xavier Standaert
      Pages 100-116
  4. Secret-Key Cryptography

    1. Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe
      Pages 134-152
    2. Laurie Genelle, Emmanuel Prouff, Michaël Quisquater
      Pages 153-169
  5. Efficient Implementations

    1. Nadia El Mrabet, Aurore Guillevic, Sorina Ionica
      Pages 188-205
  6. Cryptographic Schemes

    1. Olivier Blazy, Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Hervé Sibert, Jacques Traoré
      Pages 206-223
    2. Alex Escala, Javier Herranz, Paz Morillo
      Pages 224-241
  7. Algorithmic Problems

    1. Frederik Armknecht, Carsten Elsner, Martin Schmidt
      Pages 242-259
    2. Daniel Loebenberger, Michael Nüsken
      Pages 260-277
  8. Elliptic Curves

    1. Reza Rezaeian Farashahi
      Pages 278-289
    2. Abdoul Aziz Ciss, Djiby Sow
      Pages 290-297
  9. Fault Analysis

    1. Sandip Karmakar, Dipanwita Roy Chowdhury
      Pages 298-315

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011.
The 23 papers presented together with abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. They are organized in topical sections on protocols, cryptanalysis, secret-key cryptography, efficient implementations, cryptographic schemes, algorithmic problems, elliptic curves, fault analysis, and security proofs.

Keywords

asymmetric cryptography cryptographic attacks cryptographic protocol design differential cryptanalysis digital signature schemes encryption provable security

Editors and affiliations

  • Abderrahmane Nitaj
    • 1
  • David Pointcheval
    • 2
  1. 1.Département de MathématiquesUniversité de CaenCaen CedexFrance
  2. 2.École normale supérieure - CNRS - INRIAParisFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-21969-6
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-21968-9
  • Online ISBN 978-3-642-21969-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349