default search action
9. AFRICACRYPT 2017: Dakar, Senegal
- Marc Joye, Abderrahmane Nitaj:
Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Lecture Notes in Computer Science 10239, 2017, ISBN 978-3-319-57338-0
Cryptographic Schemes
- Mohamed Saied Emam Mohamed, Albrecht Petzoldt:
RingRainbow - An Efficient Multivariate Ring Signature Scheme. 3-20 - Meilof Veeningen:
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation. 21-39 - Liqun Chen, Thalia M. Laing, Keith M. Martin:
Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme. 40-57
Side-Channel Analysis
- Stjepan Picek, Annelie Heuser, Alan Jovic, Axel Legay:
Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks. 61-78 - Milena Djukanovic, Davide Bellizia, Giuseppe Scotti, Alessandro Trifiletti:
Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications. 79-94 - Haruhisa Kosuge, Hidema Tanaka:
Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration. 95-113
Differential Cryptanalysis
- Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round SKINNY. 117-134 - Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:
Impossible Differential Attack on Reduced Round SPARX-64/128. 135-146
Applications
- Tushar Kanti Saha, Takeshi Koshiba:
Private Conjunctive Query over Encrypted Data. 149-164 - Isheeta Nargis:
Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption. 165-183 - Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:
Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data Handling. 184-201
Number Theory
- Michel Seck, Hortense Boudjou, Nafissatou Diarra, Ahmed Youssef Ould Cheikh Khlil:
On Indifferentiable Hashing into the Jacobian of Hyperelliptic Curves of Genus 2. 205-222 - Mohammad Eftekhari:
Cryptanalysis of Some Protocols Using Matrices over Group Rings. 223-229
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.