Limit search to available items
Book Cover
E-book
Author International Conference on Cryptology in Africa (9th : 2017 : Dakar, Senegal)

Title Progress in cryptology -- AFRICACRYPT 2017 : 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings / Marc Joye, Abderrahmane Nitaj (eds.)
Published Cham, Switzerland : Springer, 2017

Copies

Description 1 online resource (x, 231 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 10239
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 10239. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; Preface; Organization AFRICACRYPT 2017; Contents; Cryptographic Schemes; RingRainbow -- An Efficient Multivariate Ring Signature Scheme; 1 Introduction; 2 Ring Signatures; 3 Multivariate Cryptography; 3.1 The Rainbow Signature Scheme; 3.2 Multivariate Ring Signature Schemes; 4 Our Ring Signature Scheme; 4.1 Security; 5 Parameters; 6 Alternative Construction of a Multivariate Ring Signature Scheme; 6.1 Unforgeability; 7 Reduction of Public Key Size; 8 Implementation and Efficiency Results; 9 Discussion; 10 Conclusion; References
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation1 Introduction; 2 Preliminaries; 2.1 Algebraic Tools, Notation, and Complexity Assumptions; 2.2 Adaptive zk-SNARKs in the CRS Model; 2.3 The Pinocchio zk-SNARK Construction from; 3 Adaptive zk-SNARKs Based on Pinocchio; 4 Smaller Proofs and Comparison to Literature; 5 Secure/Correct Adaptive Function Evaluation; 5.1 Our Construction; 5.2 Efficient Instantiation Using Secret Sharing and Our zk-SNARK; 6 Prototype and Distributed Medical Research Case; 6.1 Prototype of Our zk-SNARK and Adaptive Trinocchio
6.2 Application to Medical Survival Analysis7 Conclusion; References; Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme; 1 Introduction; 2 Preliminaries; 2.1 Secret Sharing Schemes; 2.2 Symmetric Key Encryption; 2.3 Commitment Schemes; 2.4 Error Correcting Codes; 2.5 Information Dispersal Algorithms; 3 The AONT-RS; 3.1 Generalising the AONT-RS; 3.2 Information Leakage; 3.3 Proving the Privacy of AONT-RS; 4 Extending AONT-RS to be Robust; 4.1 Proof of Privacy; 4.2 Proof of Robustness; 5 Comparing RAONT-RS and HK2; 5.1 The SSMS and HK2 Scheme
5.2 Comparison6 Conclusion; References; Side-Channel Analysis; Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks; 1 Introduction; 1.1 Idea and Contributions; 1.2 Road Map; 2 Machine Learning Techniques; 2.1 Naive Bayes; 2.2 Decision Tree -- C4.5; 2.3 Rotation Forest; 2.4 Support Vector Machines; 3 The Hierarchical Approach Under Test; 3.1 Experimental Data; 3.2 Training Phase and Parameter Tuning; 3.3 Testing Results; 4 Realistic Testing; 4.1 Hierarchical Attack; 4.2 Structured Attack; 4.3 Attack Results and Comparison with Template Attack
5 Discussion6 Conclusions; References; Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications; 1 Introduction; 2 Background; 3 Case Study; 3.1 4-Bit PRESENT Crypto-Core; 3.2 Full Implementation of PRESENT-80 Block Cipher; 3.3 Testbench; 4 Univariate Analysis of Information Leakage; 4.1 4-Bit PRESENT Crypto-Core; 4.2 Full Implementation of PRESENT-80 Block Cipher; 5 Multivariate Analysis: Can We Exploit More?; 6 Conclusion; References; Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration; 1 Introduction
Summary This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017. The 13 papers presented in this book were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptographic schemes, side-channel analysis, differential cryptanalysis, applications, and number theory
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed May 19, 2017)
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Coding theory & cryptology.
Mathematical theory of computation.
User interface design & usability.
Information architecture.
Computer security.
Computers -- Security -- General.
Computers -- Information Theory.
Computers -- Programming -- Algorithms.
Computers -- Machine Theory.
Business & Economics -- Information Management.
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Joye, Marc, 1969- editor.
Nitaj, Abderrahmane, editor.
ISBN 9783319573397
331957339X
3319573381
9783319573380
Other Titles AFRICACRYPT 2017