


default search action
8. AFRICACRYPT 2016: Fes, Morocco
- David Pointcheval

, Abderrahmane Nitaj, Tajjeeddine Rachidi:
Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings. Lecture Notes in Computer Science 9646, Springer 2016, ISBN 978-3-319-31516-4
Lattices
- Anja Becker, Thijs Laarhoven

:
Efficient (Ideal) Lattice Sieving Using Cross-Polytope LSH. 3-23 - Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer:

On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. 24-43 - Sedat Akleylek, Nina Bindel

, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson:
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. 44-60
Elliptic Curves
- Burak Gövem, Kimmo Järvinen, Kris Aerts

, Ingrid Verbauwhede
, Nele Mentens
:
A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates. 63-83 - Srinivasa Rao Subramanya Rao:

Three Dimensional Montgomery Ladder, Differential Point Tripling on Montgomery Curves and Point Quintupling on Weierstrass' and Edwards Curves. 84-106
Secret-Key Cryptanalysis
- Shahram Rasoolzadeh

, Håvard Raddum
:
Cryptanalysis of PRINCE with Minimal Data. 109-126 - John Preuß Mattsson

, Magnus Westerlund:
Authentication Key Recovery on Galois/Counter Mode (GCM). 127-143
Efficient Implementations
- Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic

, Lejla Batina, Bohan Yang, Danilo Sijacic, Nele Mentens
:
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware. 147-166 - Sumanta Sarkar, Siang Meng Sim

:
A Deeper Understanding of the XOR Count Distribution in the Context of Lightweight Cryptography. 167-182
Secure Protocols
- Helger Lipmaa:

Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs. 185-206 - Augustin P. Sarr, Philippe Elbaz-Vincent:

On the Security of the (F)HMQV Protocol. 207-224 - Ge Bai

, Ivan Damgård, Claudio Orlandi
, Yu Xia:
Non-Interactive Verifiable Secret Sharing for Monotone Circuits. 225-244 - Ivan Damgård, Rasmus Winther Zakarias:

Fast Oblivious AES A Dedicated Application of the MiniMac Protocol. 245-264 - Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen:

Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming. 265-284 - Julien Bringer, Hervé Chabanne, Roch Lescuyer:

Software-Only Two-Factor Authentication Secure Against Active Servers. 285-303
Public-Key Cryptography
- Michael Clear, Ciaran McGoldrick:

Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs. 307-324 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:

Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order. 325-345 - Magali Bardet, Vlad Dragoi

, Jean-Gabriel Luque, Ayoub Otmani
:
Weak Keys for the Quasi-Cyclic MDPC Public Key Encryption Scheme. 346-367

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














