default search action
8. AFRICACRYPT 2016: Fes, Morocco
- David Pointcheval, Abderrahmane Nitaj, Tajjeeddine Rachidi:
Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings. Lecture Notes in Computer Science 9646, Springer 2016, ISBN 978-3-319-31516-4
Lattices
- Anja Becker, Thijs Laarhoven:
Efficient (Ideal) Lattice Sieving Using Cross-Polytope LSH. 3-23 - Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer:
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. 24-43 - Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson:
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. 44-60
Elliptic Curves
- Burak Gövem, Kimmo Järvinen, Kris Aerts, Ingrid Verbauwhede, Nele Mentens:
A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates. 63-83 - Srinivasa Rao Subramanya Rao:
Three Dimensional Montgomery Ladder, Differential Point Tripling on Montgomery Curves and Point Quintupling on Weierstrass' and Edwards Curves. 84-106
Secret-Key Cryptanalysis
- Shahram Rasoolzadeh, Håvard Raddum:
Cryptanalysis of PRINCE with Minimal Data. 109-126 - John Preuß Mattsson, Magnus Westerlund:
Authentication Key Recovery on Galois/Counter Mode (GCM). 127-143
Efficient Implementations
- Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic, Lejla Batina, Bohan Yang, Danilo Sijacic, Nele Mentens:
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware. 147-166 - Sumanta Sarkar, Siang Meng Sim:
A Deeper Understanding of the XOR Count Distribution in the Context of Lightweight Cryptography. 167-182
Secure Protocols
- Helger Lipmaa:
Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs. 185-206 - Augustin P. Sarr, Philippe Elbaz-Vincent:
On the Security of the (F)HMQV Protocol. 207-224 - Ge Bai, Ivan Damgård, Claudio Orlandi, Yu Xia:
Non-Interactive Verifiable Secret Sharing for Monotone Circuits. 225-244 - Ivan Damgård, Rasmus Winther Zakarias:
Fast Oblivious AES A Dedicated Application of the MiniMac Protocol. 245-264 - Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen:
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming. 265-284 - Julien Bringer, Hervé Chabanne, Roch Lescuyer:
Software-Only Two-Factor Authentication Secure Against Active Servers. 285-303
Public-Key Cryptography
- Michael Clear, Ciaran McGoldrick:
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs. 307-324 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order. 325-345 - Magali Bardet, Vlad Dragoi, Jean-Gabriel Luque, Ayoub Otmani:
Weak Keys for the Quasi-Cyclic MDPC Public Key Encryption Scheme. 346-367
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.