Limit search to available items
Book Cover
E-book
Author International Conference on Cryptology in Africa (3rd : 2010 : Stellenbosch, South Africa)

Title Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings / Daniel J. Bernstein, Tanja Lange, Eds
Edition 1st ed
Published Berlin ; New York : Springer, ©2010

Copies

Description 1 online resource (xiii, 436 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 6055
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6055. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Signatures. A new RSA-based signature scheme / Sven Schäge and Jörg Schwenk -- Fair blind signatures without random oracles / Georg Fuchsbauer and Damien Vergnaud -- Fair partially blind signatures / Markus Rückert and Dominique Schröder -- Attacks. Parallel shortest lattice vector enumeration on graphics cards / Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, and Bart Preneel -- Flexible partial enlargement to accelerate Gröbner basis computation over F₂ / Johannes Buchmann, Daniel Cabarcas, Jintai Ding, and Mohamed Saied Emam Mohamed -- Factoring RSA modulus using prime reconstruction from random known bits / Subhamoy Maitra, Santanu Sarkar, and Sourav Sen Gupta -- Protocols. Proofs of restricted shuffles / Björn Terelius and Douglas Wikström -- Batch range proof for practical small ranges / Kun Peng and Feng Bao -- Optimistic fair priced oblivious transfer / Alfredo Rial and Bart Preneel -- Networks. Information-theoretically secure key-insulated multireceiver authentication codes / Takenobu Seito, Tadashi Aikawa, Junji Shikata, and Tsutomu Matsumoto -- Simple and communication complexity efficient almost secure and perfectly secure message transmission schemes / Yvo Desmedt, Stelios Erotokritou, and Reihaneh Safavi-Naini -- Communication efficient perfectly secure VSS and MPC in asynchronous networks with optimal resilience / Arpita Patra, Ashish Choudhury, and C. Pandu Rangan -- Elliptic curves. Avoiding full extension field arithmetic in pairing computations / Craig Costello, Colin Boyd, Juan Manuel González Nieto, and Kenneth Koon-Ho Wong -- ECC2K-130 on cell CPUs / Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, and Peter Schwabe -- Side-channel attacks and fault attacks practical improvements of profiled side-channel attacks on a hardware crypto-accelerator / M. Abdelaziz Elaabid and Sylvain Guilley -- Differential fault analysis of HC-128 / Aleksandar Kircanski and Amr M. Youssef -- Fresh re-keying : security against side-channel and fault attacks for low-cost devices / Marcel Medwed, François-Xavier Standaert, Johann Großschädl, and Francesco Regazzoni -- Public-key encryption. Strong cryptography from weak secrets : building efficient PKE and IBE from distributed passwords / Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, and David Pointcheval -- Efficient unidirectional proxy re-encryption / Sherman S.M. Chow, Jian Weng, Yanjiang Yang, and Robert H. Deng -- Public-key encryption with non-interactive opening : new constructions and stronger definitions / David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, and Dominique Schröder -- Keys and PUFs. Flexible group key exchange with on-demand computation of subgroup keys / Michel Abdalla, Céline Chevalier, Mark Manulis, and David Pointcheval -- Quantum readout of physical unclonable functions / Boris Škorić -- Ciphers and hash functions. Parallelizing the Camellia and SMS4 block ciphers / Huihui Yap, Khoongming Khoo, and Axel Poschmann -- Improved linear differential attacks on CubeHash / Shahram Khazaei, Simon Knellwolf, Willi Meier, and Deian Stefan -- Cryptanalysis of the 10-round hash and full compression function of SHAvite-3-512 / Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, and Martin Schläffer
Summary This book constitutes the proceedings of the Third International Conference on Cryptology in Africa, AFRICACRYPT 2010, held in Stellenbosch, South Africa, on May 3-6, 2010. The 25 papers presented together with three invited talks were carefully reviewed and selected from 82 submissions. The topics covered are signatures, attacks, protocols, networks, elliptic curves, side-channel attacks and fault attacks, public-key encryption, keys and PUFs, and ciphers and hash functions
Bibliography Includes bibliographical references and index
Subject Computer security -- Congresses
Computers -- Access control.
Cryptography
Computer security.
Computer Security
Computers -- Access control.
Cryptography.
Computer security.
Informatique.
Computer security
Computers -- Access control
Cryptography
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Bernstein, Daniel J
Lange, Tanja
ISBN 9783642126772
3642126774
9783642126789
3642126782