Description |
1 online resource (x, 231 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 10239 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 10239. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro; Preface; Organization AFRICACRYPT 2017; Contents; Cryptographic Schemes; RingRainbow -- An Efficient Multivariate Ring Signature Scheme; 1 Introduction; 2 Ring Signatures; 3 Multivariate Cryptography; 3.1 The Rainbow Signature Scheme; 3.2 Multivariate Ring Signature Schemes; 4 Our Ring Signature Scheme; 4.1 Security; 5 Parameters; 6 Alternative Construction of a Multivariate Ring Signature Scheme; 6.1 Unforgeability; 7 Reduction of Public Key Size; 8 Implementation and Efficiency Results; 9 Discussion; 10 Conclusion; References |
|
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation1 Introduction; 2 Preliminaries; 2.1 Algebraic Tools, Notation, and Complexity Assumptions; 2.2 Adaptive zk-SNARKs in the CRS Model; 2.3 The Pinocchio zk-SNARK Construction from; 3 Adaptive zk-SNARKs Based on Pinocchio; 4 Smaller Proofs and Comparison to Literature; 5 Secure/Correct Adaptive Function Evaluation; 5.1 Our Construction; 5.2 Efficient Instantiation Using Secret Sharing and Our zk-SNARK; 6 Prototype and Distributed Medical Research Case; 6.1 Prototype of Our zk-SNARK and Adaptive Trinocchio |
|
6.2 Application to Medical Survival Analysis7 Conclusion; References; Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme; 1 Introduction; 2 Preliminaries; 2.1 Secret Sharing Schemes; 2.2 Symmetric Key Encryption; 2.3 Commitment Schemes; 2.4 Error Correcting Codes; 2.5 Information Dispersal Algorithms; 3 The AONT-RS; 3.1 Generalising the AONT-RS; 3.2 Information Leakage; 3.3 Proving the Privacy of AONT-RS; 4 Extending AONT-RS to be Robust; 4.1 Proof of Privacy; 4.2 Proof of Robustness; 5 Comparing RAONT-RS and HK2; 5.1 The SSMS and HK2 Scheme |
|
5.2 Comparison6 Conclusion; References; Side-Channel Analysis; Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks; 1 Introduction; 1.1 Idea and Contributions; 1.2 Road Map; 2 Machine Learning Techniques; 2.1 Naive Bayes; 2.2 Decision Tree -- C4.5; 2.3 Rotation Forest; 2.4 Support Vector Machines; 3 The Hierarchical Approach Under Test; 3.1 Experimental Data; 3.2 Training Phase and Parameter Tuning; 3.3 Testing Results; 4 Realistic Testing; 4.1 Hierarchical Attack; 4.2 Structured Attack; 4.3 Attack Results and Comparison with Template Attack |
|
5 Discussion6 Conclusions; References; Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications; 1 Introduction; 2 Background; 3 Case Study; 3.1 4-Bit PRESENT Crypto-Core; 3.2 Full Implementation of PRESENT-80 Block Cipher; 3.3 Testbench; 4 Univariate Analysis of Information Leakage; 4.1 4-Bit PRESENT Crypto-Core; 4.2 Full Implementation of PRESENT-80 Block Cipher; 5 Multivariate Analysis: Can We Exploit More?; 6 Conclusion; References; Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration; 1 Introduction |
Summary |
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017. The 13 papers presented in this book were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptographic schemes, side-channel analysis, differential cryptanalysis, applications, and number theory |
Notes |
International conference proceedings |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed May 19, 2017) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Coding theory & cryptology.
|
|
Mathematical theory of computation.
|
|
User interface design & usability.
|
|
Information architecture.
|
|
Computer security.
|
|
Computers -- Security -- General.
|
|
Computers -- Information Theory.
|
|
Computers -- Programming -- Algorithms.
|
|
Computers -- Machine Theory.
|
|
Business & Economics -- Information Management.
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Joye, Marc, 1969- editor.
|
|
Nitaj, Abderrahmane, editor.
|
ISBN |
9783319573397 |
|
331957339X |
|
3319573381 |
|
9783319573380 |