Progress in Cryptology - AFRICACRYPT 2012

5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings

  • Aikaterini Mitrokotsa
  • Serge Vaudenay
Conference proceedings AFRICACRYPT 2012
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7374)

Table of contents

  1. Front Matter
  2. Signature Schemes

    1. Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer
      Pages 1-18
    2. Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel
      Pages 19-34
    3. Sébastien Canard, Amandine Jambert, Roch Lescuyer
      Pages 35-52
  3. Stream Ciphers

    1. Jingjing Wang, Xiangxue Li, Kefei Chen, Wenzheng Zhang
      Pages 53-66
  4. Applications of Information Theory

    1. Julien Bringer, Hervé Chabanne, Mélanie Favre
      Pages 67-81
    2. Mohammed Meziani, Gerhard Hoffmann, Pierre-Louis Cayrel
      Pages 99-116
  5. Block Ciphers

    1. Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta
      Pages 138-154
    2. Yue Sun, Meiqin Wang, Shujia Jiang, Qiumei Sun
      Pages 155-171
    3. Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof et al.
      Pages 172-187
  6. Network Security Protocols

    1. Augustin P. Sarr, Philippe Elbaz–Vincent
      Pages 203-220
  7. Public-Key Cryptography

    1. Abderrahmane Nitaj
      Pages 221-233
    2. Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter
      Pages 234-251
  8. Cryptanalysis of Hash Functions

    1. Ewan Fleischmann, Christian Forler, Stefan Lucks
      Pages 252-269
    2. Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann et al.
      Pages 270-286
    3. Elena Andreeva, Bart Mennink, Bart Preneel, Marjan Škrobot
      Pages 287-305
  9. Hash Functions: Design and Implementation

    1. Thierry P. Berger, Joffrey D’Hayer, Kevin Marquet, Marine Minier, Gaël Thomas
      Pages 306-323

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.

Keywords

RSA attacks authentication homomorphic encryption performance evaluation

Editors and affiliations

  • Aikaterini Mitrokotsa
    • 1
  • Serge Vaudenay
    • 1
  1. 1.Ecole Polytechnice Fédérale de Lausanne, IC - LASECLausanneSwitzerland

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-31410-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-31409-4
  • Online ISBN 978-3-642-31410-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349