


default search action
4. AFRICACRYPT 2011: Dakar, Senegal
- Abderrahmane Nitaj, David Pointcheval

:
Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings. Lecture Notes in Computer Science 6737, Springer 2011, ISBN 978-3-642-21968-9
Protocols
- Jake Loftus, Nigel P. Smart:

Secure Outsourced Computation. 1-20 - Carolin Lunemann, Jesper Buus Nielsen

:
Fully Simulatable Quantum-Secure Coin-Flipping and Applications. 21-40 - Damien Vergnaud

:
Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform. 41-58 - Hiroaki Anada, Seiko Arita:

Identification Schemes from Key Encapsulation Mechanisms. 59-76
Cryptanalysis
- Zhenyu Huang, Dongdai Lin:

Attacking Bivium and Trivium with the Characteristic Set Method. 77-91 - Mathias Herrmann:

Improved Cryptanalysis of the Multi-Prime φ - Hiding Assumption. 92-99 - Stéphanie Kerckhof, Baudoin Collard, François-Xavier Standaert

:
FPGA Implementation of a Statistical Saturation Attack against PRESENT. 100-116 - Yu Sasaki:

Collisions of MMO-MD5 and Their Impact on Original MD5. 117-133
Secret-Key Cryptography
- Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe:

Really Fast Syndrome-Based Hashing. 134-152 - Laurie Genelle, Emmanuel Prouff, Michaël Quisquater:

Montgomery's Trick and Fast Implementation of Masked AES. 153-169
Efficient Implementations
- Michael Hutter, Marc Joye, Yannick Sierra:

Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation. 170-187 - Nadia El Mrabet, Aurore Guillevic

, Sorina Ionica:
Efficient Multiplication in Finite Field Extensions of Degree 5. 188-205
Cryptographic Schemes
- Olivier Blazy

, Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Hervé Sibert, Jacques Traoré:
Achieving Optimal Anonymity in Transferable E-Cash with a Judge. 206-223 - Alex Escala, Javier Herranz

, Paz Morillo:
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model. 224-241
Algorithmic Problems
- Frederik Armknecht

, Carsten Elsner, Martin Schmidt:
Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design. 242-259 - Daniel Loebenberger

, Michael Nüsken:
Analyzing Standards for RSA Integers. 260-277
Elliptic Curves
- Reza Rezaeian Farashahi

:
Hashing into Hessian Curves. 278-289 - Abdoul Aziz Ciss, Djiby Sow:

On Randomness Extraction in Elliptic Curves. 290-297
Fault Analysis
- Sandip Karmakar, Dipanwita Roy Chowdhury:

Fault Analysis of Grain-128 by Targeting NFSR. 298-315 - Yaser Esmaeili Salehani, Aleksandar Kircanski, Amr M. Youssef:

Differential Fault Analysis of Sosemanuk. 316-331 - Subidh Ali

, Debdeep Mukhopadhyay:
An Improved Differential Fault Analysis on AES-256. 332-347
Security Proofs
- Laurent Fousse, Pascal Lafourcade

, Mohamed Alnuaimi:
Benaloh's Dense Probabilistic Encryption Revisited. 348-362 - Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing

, Markus Rückert:
On the Security of the Winternitz One-Time Signature Scheme. 363-378
Invited Talks
- Jens Groth:

Efficient Zero-Knowledge Proofs. 379 - Tatsuaki Okamoto, Katsuyuki Takashima:

Some Key Techniques on Pairing Vector Spaces. 380-382 - Bart Preneel

:
The NIST SHA-3 Competition: A Perspective on the Final Year. 383-386

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














