


default search action
10th AFRICACRYPT 2018: Marrakesh, Morocco
- Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi:

Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings. Lecture Notes in Computer Science 10831, Springer 2018, ISBN 978-3-319-89338-9
Symmetric Cryptography
- Constanza Riera, Patrick Solé, Pantelimon Stanica

:
A Complete Characterization of Plateaued Boolean Functions in Terms of Their Cayley Graphs. 3-10 - Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig

:
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications. 11-32 - Kaiyan Zheng, Peng Wang, Dingfeng Ye:

Ubiquitous Weak-Key Classes of BRW-Polynomial Function. 33-50 - Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim

:
Lightweight MDS Serial-Type Matrices with Minimal Fixed XOR Count. 51-71 - Jacques Patarin:

Two Simple Composition Theorems with H-coefficients. 72-86 - Yu Sasaki:

Improved Related-Tweakey Boomerang Attacks on Deoxys-BC. 87-106 - Ricardo Chaves

, Lukasz Chmielewski, Francesco Regazzoni
, Lejla Batina:
SCA-Resistance for AES: How Cheap Can We Go? 107-123 - Rajendra Kumar

, Mahesh Sreekumar Rajasree
, Hoda Alkhzaimi
:
Cryptanalysis of 1-Round KECCAK. 124-137
Asymmetric Cryptography
- Giulia Traverso, Denise Demirel, Johannes Buchmann:

Performing Computations on Hierarchically Shared Secrets. 141-161 - Masaya Yasuda, Junpei Yamaguchi, Michiko Ooka, Satoshi Nakamura:

Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge. 162-182 - Michel Seck

, Nafissatou Diarra:
Unified Formulas for Some Deterministic Almost-Injective Encodings into Hyperelliptic Curves. 183-202 - Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny:

HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction. 203-216 - Guillaume Bonnoron, Léo Ducas, Max Fillinger:

Large FHE Gates from Tensored Homomorphic Accumulator. 217-251 - Gilles Macario-Rat

, Jacques Patarin:
Two-Face: New Public Key Multivariate Schemes. 252-265 - Mengce Zheng

, Noboru Kunihiro
, Honggang Hu:
Cryptanalysis of RSA Variants with Modified Euler Quotient. 266-281 - Jan-Pieter D'Anvers

, Angshuman Karmakar
, Sujoy Sinha Roy, Frederik Vercauteren
:
Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM. 282-305 - Niels Samwel

, Lejla Batina:
Practical Fault Injection on Deterministic Signatures: The Case of EdDSA. 306-321 - Elizabeth A. Quaglia

, Ben Smyth
:
Authentication with Weaker Trust Assumptions for Voting Systems. 322-343 - Bertram Poettering

:
Shorter Double-Authentication Preventing Signatures for Small Address Spaces. 344-361

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














