default search action
10th AFRICACRYPT 2018: Marrakesh, Morocco
- Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi:
Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings. Lecture Notes in Computer Science 10831, Springer 2018, ISBN 978-3-319-89338-9
Symmetric Cryptography
- Constanza Riera, Patrick Solé, Pantelimon Stanica:
A Complete Characterization of Plateaued Boolean Functions in Terms of Their Cayley Graphs. 3-10 - Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications. 11-32 - Kaiyan Zheng, Peng Wang, Dingfeng Ye:
Ubiquitous Weak-Key Classes of BRW-Polynomial Function. 33-50 - Dylan Toh, Jacob Teo, Khoongming Khoo, Siang Meng Sim:
Lightweight MDS Serial-Type Matrices with Minimal Fixed XOR Count. 51-71 - Jacques Patarin:
Two Simple Composition Theorems with H-coefficients. 72-86 - Yu Sasaki:
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC. 87-106 - Ricardo Chaves, Lukasz Chmielewski, Francesco Regazzoni, Lejla Batina:
SCA-Resistance for AES: How Cheap Can We Go? 107-123 - Rajendra Kumar, Mahesh Sreekumar Rajasree, Hoda Alkhzaimi:
Cryptanalysis of 1-Round KECCAK. 124-137
Asymmetric Cryptography
- Giulia Traverso, Denise Demirel, Johannes Buchmann:
Performing Computations on Hierarchically Shared Secrets. 141-161 - Masaya Yasuda, Junpei Yamaguchi, Michiko Ooka, Satoshi Nakamura:
Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge. 162-182 - Michel Seck, Nafissatou Diarra:
Unified Formulas for Some Deterministic Almost-Injective Encodings into Hyperelliptic Curves. 183-202 - Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny:
HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction. 203-216 - Guillaume Bonnoron, Léo Ducas, Max Fillinger:
Large FHE Gates from Tensored Homomorphic Accumulator. 217-251 - Gilles Macario-Rat, Jacques Patarin:
Two-Face: New Public Key Multivariate Schemes. 252-265 - Mengce Zheng, Noboru Kunihiro, Honggang Hu:
Cryptanalysis of RSA Variants with Modified Euler Quotient. 266-281 - Jan-Pieter D'Anvers, Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren:
Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM. 282-305 - Niels Samwel, Lejla Batina:
Practical Fault Injection on Deterministic Signatures: The Case of EdDSA. 306-321 - Elizabeth A. Quaglia, Ben Smyth:
Authentication with Weaker Trust Assumptions for Voting Systems. 322-343 - Bertram Poettering:
Shorter Double-Authentication Preventing Signatures for Small Address Spaces. 344-361
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.