default search action
6. AFRICACRYPT 2013: Cairo, Egypt
- Amr M. Youssef, Abderrahmane Nitaj, Aboul Ella Hassanien:
Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings. Lecture Notes in Computer Science 7918, Springer 2013, ISBN 978-3-642-38552-0 - Carlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit:
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting. 1-25 - Utsab Bose, Anup Kumar Bhattacharya, Abhijit Das:
GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field. 26-42 - Kishan Chand Gupta, Indranil Ghosh Ray:
On Constructions of Involutory MDS Matrices. 43-60 - Michael Clear, Arthur Hughes, Hitesh Tewari:
Homomorphic Encryption with Access Policies: Characterization and New Constructions. 61-87 - Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade:
Brandt's Fully Private Auction Protocol Revisited. 88-106 - Alexandre Duc, Serge Vaudenay:
HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems. 107-126 - Hassan Aly, Mohammed ElGayyar:
Attacking AES Using Bernstein's Attack on Modern Processors. 127-139 - Philippe Guillot, Abdelkrim Nimour, Duong Hieu Phan, Viet Cuong Trinh:
Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model. 140-155 - Michael Hutter, Peter Schwabe:
NaCl on 8-Bit AVR Microcontrollers. 156-172 - Andreas Hülsing:
W-OTS+ - Shorter Signatures for Hash-Based Signature Schemes. 173-188 - Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay:
New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs. 189-207 - Marco Macchetti:
Cryptanalysis of AES and Camellia with Related S-boxes. 208-221 - Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann, Willi Meier:
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4. 222-239 - Louis Goubin, Ange Martinelli, Matthieu Walle:
Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design. 240-259 - Isheeta Nargis, Payman Mohassel, Wayne Eberly:
Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority. 260-278 - Christophe Nègre, Jean-Marc Robert:
Impact of Optimized Field Operations AB, AC and AB + CD in Scalar Multiplication over Binary Elliptic Curve. 279-296 - Abderrahmane Nitaj:
An Attack on RSA Using LSBs of Multiples of the Prime Factors. 297-310 - Kun Peng:
Modification and Optimisation of an ElGamal-Based PVSS Scheme. 311-327 - Kun Peng, Li Yi:
Studying a Range Proof Technique - Exception and Optimisation. 328-341 - Duong Hieu Phan, Viet Cuong Trinh:
Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model. 342-358 - David Gstir, Martin Schläffer:
Fast Software Encryption Attacks on AES. 359-374 - Michael Schneider:
Sieving for Shortest Vectors in Ideal Lattices. 375-391 - Sebastian Staamann:
An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection. 392-405 - Fabian van den Broek, Erik Poll:
A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers. 406-423 - Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
On the Expansion Length Of Triple-Base Number Systems. 424-432 - Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
Triple-Base Number System for Scalar Multiplication. 433-451
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.