


default search action
10th AFRICACRYPT 2019: Rabat, Morocco
- Johannes Buchmann, Abderrahmane Nitaj, Tajje-eddine Rachidi:

Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings. Lecture Notes in Computer Science 11627, Springer 2019, ISBN 978-3-030-23695-3
Protocols
- Jacob Appelbaum, Chloe Martindale, Peter Wu:

Tiny WireGuard Tweak. 3-20 - Sébastien Canard, Loïc Ferreira:

Extended 3-Party \textACCE and Application to LoRaWAN 1.1. 21-38
Post-quantum Cryptography
- Alessandro Budroni

, Andrea Tenti:
The Mersenne Low Hamming Combination Search Problem Can Be Reduced to an ILP Problem. 41-55 - Vanessa Vitse:

Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies. 56-78 - Hamad Al Shehhi

, Emanuele Bellini
, Filipe Borba, Florian Caullery, Marc Manzano, Víctor Mateu
:
An IND-CCA-Secure Code-Based Encryption Scheme Using Rank Metric. 79-96
Zero-Knowledge
- Behzad Abdolmaleki, Karim Baghery

, Helger Lipmaa, Janno Siim
, Michal Zajac:
UC-Secure CRS Generation for SNARKs. 99-117 - Karim Baghery

:
On the Efficiency of Privacy-Preserving Smart Contract Systems. 118-136
Lattice Based Cryptography
- Dipayan Das, Man Ho Au, Zhenfei Zhang:

Ring Signatures Based on Middle-Product Learning with Errors Problems. 139-156 - Michael Walter

:
Sampling the Integers with Low Relative Error. 157-180 - Shi Bai, Shaun Miller, Weiqiang Wen:

A Refined Analysis of the Cost for Solving LWE via uSVP. 181-205
New Schemes and Analysis
- Leon Botros, Matthias J. Kannwischer, Peter Schwabe:

Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4. 209-228 - Francesco Berti, Olivier Pereira, François-Xavier Standaert

:
Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher. 229-249 - Youssef Harmouch, Rachid El Kouch, Hussain Ben-Azza

:
An Improvement of Correlation Analysis for Vectorial Boolean Functions. 250-269
Block Ciphers
- Muhammad ElSheikh

, Ahmed Abdelkhalek, Amr M. Youssef:
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. 273-296 - Navid Ghaedi Bardeh

, Sondre Rønjom:
Practical Attacks on Reduced-Round AES. 297-310 - Fatih Balli, Subhadeep Banik

:
Six Shades of AES. 311-329
Side-Channel Attacks and Countermeasures
- Clément Massart, François-Xavier Standaert

:
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint. 333-351 - Sumesh Manjunath Ramesh

, Hoda Alkhzaimi
:
Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures. 352-369 - Ke Wang

, Haodong Jiang:
Analysis of Two Countermeasures Against the Signal Leakage Attack. 370-388
Signatures
- Gustavo Zambonin

, Matheus S. P. Bittencourt, Ricardo Felipe Custódio:
Handling Vinegar Variables to Shorten Rainbow Key Pairs. 391-408 - Essam Ghadafi

:
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups. 409-428 - Lydia Garms, Elizabeth A. Quaglia

:
A New Approach to Modelling Centralised Reputation Systems. 429-447

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














