


default search action
16th AFRICACRYPT 2025: Rabat, Morocco
- Abderrahmane Nitaj

, Svetla Petkova-Nikova
, Vincent Rijmen
:
Progress in Cryptology - AFRICACRYPT 2025 - 16th International Conference on Cryptology in Africa, Rabat, Morocco, July 21-23, 2025, Proceedings. Lecture Notes in Computer Science 15651, Springer 2026, ISBN 978-3-031-97259-1
Homomorphic Encryption
- Axel Mertens

, Georgio Nicolas
, Sergi Rovira
:
Convolution-Friendly Image Compression with FHE. 3-24 - Mahdi Mahdavi, Ehsan Meamari, Emad Heydari Beni, Maryam Sheikhi:

Leveled Homomorphic Encryption over Composite Groups. 25-50 - Nges Brian Njungle

, Michel A. Kinsy
:
Activate Me!: Designing Efficient Activation Functions for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption. 51-73 - Mahdi Mahdavi

, Helena Rifà-Pous
:
One-Way Homomorphic Encryption: A Composite Group Approach. 74-88
Cryptanalysis of RSA
- Mengce Zheng

, Abderrahmane Nitaj
:
A Novel Partial Key Exposure Attack on Common Prime RSA. 91-112 - Mohammed Rahmani, Abderrahmane Nitaj

:
Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve. 113-125 - Michel Seck

, Oumar Niang, Djiby Sow, Abderrahmane Nitaj
, Mengce Zheng, Maher Boudabra:
A New Generalized Attack on RSA-Like Cryptosystems. 126-144
Cryptography Arithmetic
- Nour-eddine Rahmani

, Taoufik Serraj, Moulay Chrif Ismaili:
An Improvement of the Congruence Solver of Lattice Isomorphism Problem over Totally Real Number Fields and Applications. 147-163 - Fangan-Yssouf Dosso

, Sylvain Duquesne
, Nadia El Mrabet
, Emma Gautier:
PMNS Arithmetic for Elliptic Curve Cryptography. 164-191 - Fatna Kouider

, Anisha Mukherjee
, David Jacquemin, Péter Kutas:
Constant-Time Integer Arithmetic for SQIsign. 192-215 - Xiaowen Hu, Hanyu Wei, Hengchuan Zou, Zhichuang Liang, Wenqian Li, Yunlei Zhao:

FPTRU: Optimization of NTRU-Prime and TLS Performance Assessment. 216-241
Side-channel Attacks
- Anisha Mukherjee

, Maciej Czuprynko
, David Jacquemin, Péter Kutas, Sujoy Sinha Roy
:
Simple Power Analysis Attack on SQIsign. 245-269 - Maciej Czuprynko

, Anisha Mukherjee
, Sujoy Sinha Roy
:
Correlation Power Analysis of LESS and CROSS. 270-295 - Sumesh Manjunath Ramesh

, Hoda Alkhzaimi:
TPL: Power Leakage Model Based on Technology Library. 296-316
Designs
- Daniel Augot, Olivier Blazy, Hugo Delavenne, Lola-Baie Mallordy:

Bivariate Proximity Test-Based Asynchronous Verifiable Secret Sharing. 319-342 - István András Seres, Péter Burcsi:

Behemoth: Transparent Polynomial Commitment Scheme with Constant Opening Proof Size and Verifier Time. 343-369 - Arani Raychaudhuri, Ramprasad Sarkar

, Mriganka Mandal
:
Attribute-Based Encryption Using Sum-Product Decomposition of Boolean Functions. 370-394 - Dimitri Koshelev

:
Simultaneously Simple Universal and Indifferentiable Hashing to Elliptic Curves. 395-413
Cryptanalysis
- Bibhas Chandra Das

:
Conjunctive Dynamic SSE Schemes Under Scrutiny: Exposing Privacy Issues in SDSSE-CQ-S and VCDSSE. 417-440 - Anirudh Aitipamula, Debranjan Pal, Dipanwita Roy Chowdhury:

Efficient and Optimized Modeling of S-Boxes. 441-469 - Solane El Hirch, Frank Custers, Christine van Vredendaal:

Tearing Solutions for Tree Traversal in Stateful Hash-Based Cryptography. 470-492

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














