


default search action
1. AFRICACRYPT 2008: Casablanca, Morocco
- Serge Vaudenay:
Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings. Lecture Notes in Computer Science 5023, Springer 2008, ISBN 978-3-540-68159-5
AES
- Samuel Galice, Marine Minier:
Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds. 1-15 - Philippe Bulens, François-Xavier Standaert
, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy:
Implementation of the AES-128 on Virtex-5 FPGAs. 16-26
Analysis of RFID Protocols
- Paolo D'Arco, Alfredo De Santis
:
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. 27-39 - Meiqin Wang:
Differential Cryptanalysis of Reduced-Round PRESENT. 40-49
Invited Talk
- Bruce Schneier:
The Psychology of Security. 50-79
Cryptographic Protocols
- Fabien Coelho:
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees. 80-93 - Kamer Kaya, Ali Aydin Selçuk
:
Robust Threshold Schemes Based on the Chinese Remainder Theorem. 94-108 - Julien Bringer, Hervé Chabanne:
An Authentication Protocol with Encrypted Biometric Data. 109-124
Authentication
- Tetsu Iwata:
Authenticated Encryption Mode for Beyond the Birthday Bound Security. 125-142 - Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Cryptanalysis of the TRMS Signature Scheme of PKC'05. 143-155
Public-Key Cryptography
- Noboru Kunihiro
:
New Definition of Density on Knapsack Cryptosystems. 156-173 - Abderrahmane Nitaj:
Another Generalization of Wiener's Attack on RSA. 174-190 - Michael J. Jacobson Jr., Renate Scheidler
, Daniel Weimer:
An Adaptation of the NICE Cryptosystem to Real Quadratic Orders. 191-208
Pseudorandomness
- Jacques Patarin:
A Proof of Security in O(2n) for the Benes Scheme. 209-220
Analysis of Stream Ciphers
- Pascal Delaunay, Antoine Joux:
Yet Another Attack on Vest. 221-235 - Simon Fischer, Shahram Khazaei
, Willi Meier:
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. 236-245 - Emilia Käsper, Vincent Rijmen
, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar:
Correlated Keystreams in Moustique. 246-257 - Andrea Röck:
Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State. 258-275 - Christophe De Cannière, Özgül Küçük
, Bart Preneel:
Analysis of Grain's Initialization Algorithm. 276-289
Hash Functions
- Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
:
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. 290-307 - Jean-Philippe Aumasson, Raphael C.-W. Phan
:
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?. 308-324
Broadcast Encryption
- David Lubicz, Thomas Sirvent:
Attribute-Based Broadcast Encryption Scheme Made Efficient. 325-342 - Per Austrin, Gunnar Kreitz:
Lower Bounds for Subset Cover Based Broadcast Encryption. 343-356
Invited Talk
- Alexander W. Dent:
A Brief History of Provably-Secure Public-Key Encryption. 357-370
Implementation
- Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe:
On Compressible Pairings and Their Computation. 371-388 - Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters:
Twisted Edwards Curves. 389-405 - Murat Cenk
, Ferruh Özbudak
:
Efficient Multiplication in F3kn, m>=1 and 5<=l<=18. 406-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.