


default search action
6. AFRICACRYPT 2013: Cairo, Egypt
- Amr M. Youssef, Abderrahmane Nitaj, Aboul Ella Hassanien:

Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings. Lecture Notes in Computer Science 7918, Springer 2013, ISBN 978-3-642-38552-0 - Carlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit:

Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting. 1-25 - Utsab Bose, Anup Kumar Bhattacharya, Abhijit Das:

GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field. 26-42 - Kishan Chand Gupta, Indranil Ghosh Ray:

On Constructions of Involutory MDS Matrices. 43-60 - Michael Clear, Arthur Hughes, Hitesh Tewari

:
Homomorphic Encryption with Access Policies: Characterization and New Constructions. 61-87 - Jannik Dreier, Jean-Guillaume Dumas

, Pascal Lafourcade
:
Brandt's Fully Private Auction Protocol Revisited. 88-106 - Alexandre Duc, Serge Vaudenay:

HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems. 107-126 - Hassan Aly

, Mohammed ElGayyar:
Attacking AES Using Bernstein's Attack on Modern Processors. 127-139 - Philippe Guillot, Abdelkrim Nimour, Duong Hieu Phan

, Viet Cuong Trinh
:
Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model. 140-155 - Michael Hutter, Peter Schwabe:

NaCl on 8-Bit AVR Microcontrollers. 156-172 - Andreas Hülsing:

W-OTS+ - Shorter Signatures for Hash-Based Signature Schemes. 173-188 - Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay:

New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs. 189-207 - Marco Macchetti:

Cryptanalysis of AES and Camellia with Related S-boxes. 208-221 - Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann, Willi Meier:

New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4. 222-239 - Louis Goubin, Ange Martinelli, Matthieu Walle:

Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design. 240-259 - Isheeta Nargis, Payman Mohassel, Wayne Eberly:

Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority. 260-278 - Christophe Nègre, Jean-Marc Robert:

Impact of Optimized Field Operations AB, AC and AB + CD in Scalar Multiplication over Binary Elliptic Curve. 279-296 - Abderrahmane Nitaj:

An Attack on RSA Using LSBs of Multiples of the Prime Factors. 297-310 - Kun Peng:

Modification and Optimisation of an ElGamal-Based PVSS Scheme. 311-327 - Kun Peng, Li Yi:

Studying a Range Proof Technique - Exception and Optimisation. 328-341 - Duong Hieu Phan

, Viet Cuong Trinh
:
Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model. 342-358 - David Gstir, Martin Schläffer:

Fast Software Encryption Attacks on AES. 359-374 - Michael Schneider:

Sieving for Shortest Vectors in Ideal Lattices. 375-391 - Sebastian Staamann:

An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection. 392-405 - Fabian van den Broek, Erik Poll:

A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers. 406-423 - Wei Yu, Kunpeng Wang, Bao Li, Song Tian:

On the Expansion Length Of Triple-Base Number Systems. 424-432 - Wei Yu, Kunpeng Wang, Bao Li, Song Tian:

Triple-Base Number System for Scalar Multiplication. 433-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














