Description |
1 online resource (xiii, 436 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 6055 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 6055. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Signatures. A new RSA-based signature scheme / Sven Schäge and Jörg Schwenk -- Fair blind signatures without random oracles / Georg Fuchsbauer and Damien Vergnaud -- Fair partially blind signatures / Markus Rückert and Dominique Schröder -- Attacks. Parallel shortest lattice vector enumeration on graphics cards / Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, and Bart Preneel -- Flexible partial enlargement to accelerate Gröbner basis computation over F₂ / Johannes Buchmann, Daniel Cabarcas, Jintai Ding, and Mohamed Saied Emam Mohamed -- Factoring RSA modulus using prime reconstruction from random known bits / Subhamoy Maitra, Santanu Sarkar, and Sourav Sen Gupta -- Protocols. Proofs of restricted shuffles / Björn Terelius and Douglas Wikström -- Batch range proof for practical small ranges / Kun Peng and Feng Bao -- Optimistic fair priced oblivious transfer / Alfredo Rial and Bart Preneel -- Networks. Information-theoretically secure key-insulated multireceiver authentication codes / Takenobu Seito, Tadashi Aikawa, Junji Shikata, and Tsutomu Matsumoto -- Simple and communication complexity efficient almost secure and perfectly secure message transmission schemes / Yvo Desmedt, Stelios Erotokritou, and Reihaneh Safavi-Naini -- Communication efficient perfectly secure VSS and MPC in asynchronous networks with optimal resilience / Arpita Patra, Ashish Choudhury, and C. Pandu Rangan -- Elliptic curves. Avoiding full extension field arithmetic in pairing computations / Craig Costello, Colin Boyd, Juan Manuel González Nieto, and Kenneth Koon-Ho Wong -- ECC2K-130 on cell CPUs / Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, and Peter Schwabe -- Side-channel attacks and fault attacks practical improvements of profiled side-channel attacks on a hardware crypto-accelerator / M. Abdelaziz Elaabid and Sylvain Guilley -- Differential fault analysis of HC-128 / Aleksandar Kircanski and Amr M. Youssef -- Fresh re-keying : security against side-channel and fault attacks for low-cost devices / Marcel Medwed, François-Xavier Standaert, Johann Großschädl, and Francesco Regazzoni -- Public-key encryption. Strong cryptography from weak secrets : building efficient PKE and IBE from distributed passwords / Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, and David Pointcheval -- Efficient unidirectional proxy re-encryption / Sherman S.M. Chow, Jian Weng, Yanjiang Yang, and Robert H. Deng -- Public-key encryption with non-interactive opening : new constructions and stronger definitions / David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, and Dominique Schröder -- Keys and PUFs. Flexible group key exchange with on-demand computation of subgroup keys / Michel Abdalla, Céline Chevalier, Mark Manulis, and David Pointcheval -- Quantum readout of physical unclonable functions / Boris Škorić -- Ciphers and hash functions. Parallelizing the Camellia and SMS4 block ciphers / Huihui Yap, Khoongming Khoo, and Axel Poschmann -- Improved linear differential attacks on CubeHash / Shahram Khazaei, Simon Knellwolf, Willi Meier, and Deian Stefan -- Cryptanalysis of the 10-round hash and full compression function of SHAvite-3-512 / Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, and Martin Schläffer |
Summary |
This book constitutes the proceedings of the Third International Conference on Cryptology in Africa, AFRICACRYPT 2010, held in Stellenbosch, South Africa, on May 3-6, 2010. The 25 papers presented together with three invited talks were carefully reviewed and selected from 82 submissions. The topics covered are signatures, attacks, protocols, networks, elliptic curves, side-channel attacks and fault attacks, public-key encryption, keys and PUFs, and ciphers and hash functions |
Bibliography |
Includes bibliographical references and index |
Subject |
Computer security -- Congresses
|
|
Computers -- Access control.
|
|
Cryptography
|
|
Computer security.
|
|
Computer Security
|
|
Computers -- Access control.
|
|
Cryptography.
|
|
Computer security.
|
|
Informatique.
|
|
Computer security
|
|
Computers -- Access control
|
|
Cryptography
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Bernstein, Daniel J
|
|
Lange, Tanja
|
ISBN |
9783642126772 |
|
3642126774 |
|
9783642126789 |
|
3642126782 |
|