default search action
Search dblp for Publications
export results for "toc:db/conf/africacrypt/africacrypt2018.bht:"
@inproceedings{DBLP:conf/africacrypt/BernsteinB0P18, author = {Daniel J. Bernstein and Leon Groot Bruinderink and Tanja Lange and Lorenz Panny}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {{HILA5} Pindakaas: On the {CCA} Security of Lattice-Based Encryption with Error Correction}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {203--216}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_12}, doi = {10.1007/978-3-319-89339-6\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BernsteinB0P18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BonnoronDF18, author = {Guillaume Bonnoron and L{\'{e}}o Ducas and Max Fillinger}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Large {FHE} Gates from Tensored Homomorphic Accumulator}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {217--251}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_13}, doi = {10.1007/978-3-319-89339-6\_13}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BonnoronDF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ChavesCRB18, author = {Ricardo Chaves and Lukasz Chmielewski and Francesco Regazzoni and Lejla Batina}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {SCA-Resistance for {AES:} How Cheap Can We Go?}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {107--123}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_7}, doi = {10.1007/978-3-319-89339-6\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/ChavesCRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/DAnversKRV18, author = {Jan{-}Pieter D'Anvers and Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure {KEM}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {282--305}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_16}, doi = {10.1007/978-3-319-89339-6\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/DAnversKRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/KrennPSS18, author = {Stephan Krenn and Henrich C. P{\"{o}}hls and Kai Samelin and Daniel Slamanig}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {11--32}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_2}, doi = {10.1007/978-3-319-89339-6\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/KrennPSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/KumarRA18, author = {Rajendra Kumar and Mahesh Sreekumar Rajasree and Hoda Alkhzaimi}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Cryptanalysis of 1-Round {KECCAK}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {124--137}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_8}, doi = {10.1007/978-3-319-89339-6\_8}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/KumarRA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Macario-RatP18, author = {Gilles Macario{-}Rat and Jacques Patarin}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Two-Face: New Public Key Multivariate Schemes}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {252--265}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_14}, doi = {10.1007/978-3-319-89339-6\_14}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Macario-RatP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Patarin18, author = {Jacques Patarin}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Two Simple Composition Theorems with H-coefficients}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {72--86}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_5}, doi = {10.1007/978-3-319-89339-6\_5}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Patarin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Poettering18, author = {Bertram Poettering}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Shorter Double-Authentication Preventing Signatures for Small Address Spaces}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {344--361}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_19}, doi = {10.1007/978-3-319-89339-6\_19}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Poettering18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/QuagliaS18, author = {Elizabeth A. Quaglia and Ben Smyth}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Authentication with Weaker Trust Assumptions for Voting Systems}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {322--343}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_18}, doi = {10.1007/978-3-319-89339-6\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/QuagliaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/RieraSS18, author = {Constanza Riera and Patrick Sol{\'{e}} and Pantelimon Stanica}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {A Complete Characterization of Plateaued Boolean Functions in Terms of Their Cayley Graphs}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {3--10}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_1}, doi = {10.1007/978-3-319-89339-6\_1}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/RieraSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/SamwelB18, author = {Niels Samwel and Lejla Batina}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Practical Fault Injection on Deterministic Signatures: The Case of EdDSA}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {306--321}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_17}, doi = {10.1007/978-3-319-89339-6\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/SamwelB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Sasaki18, author = {Yu Sasaki}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Improved Related-Tweakey Boomerang Attacks on Deoxys-BC}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {87--106}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_6}, doi = {10.1007/978-3-319-89339-6\_6}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Sasaki18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/SeckD18, author = {Michel Seck and Nafissatou Diarra}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Unified Formulas for Some Deterministic Almost-Injective Encodings into Hyperelliptic Curves}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {183--202}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_11}, doi = {10.1007/978-3-319-89339-6\_11}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/SeckD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/TohTKS18, author = {Dylan Toh and Jacob Teo and Khoongming Khoo and Siang Meng Sim}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Lightweight {MDS} Serial-Type Matrices with Minimal Fixed {XOR} Count}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {51--71}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_4}, doi = {10.1007/978-3-319-89339-6\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/TohTKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/TraversoD018, author = {Giulia Traverso and Denise Demirel and Johannes Buchmann}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Performing Computations on Hierarchically Shared Secrets}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {141--161}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_9}, doi = {10.1007/978-3-319-89339-6\_9}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/TraversoD018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/YasudaYON18, author = {Masaya Yasuda and Junpei Yamaguchi and Michiko Ooka and Satoshi Nakamura}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Development of a Dual Version of DeepBKZ and Its Application to Solving the {LWE} Challenge}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {162--182}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_10}, doi = {10.1007/978-3-319-89339-6\_10}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/YasudaYON18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ZhengKH18, author = {Mengce Zheng and Noboru Kunihiro and Honggang Hu}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Cryptanalysis of {RSA} Variants with Modified Euler Quotient}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {266--281}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_15}, doi = {10.1007/978-3-319-89339-6\_15}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/ZhengKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ZhengWY18, author = {Kaiyan Zheng and Peng Wang and Dingfeng Ye}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Ubiquitous Weak-Key Classes of BRW-Polynomial Function}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {33--50}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_3}, doi = {10.1007/978-3-319-89339-6\_3}, timestamp = {Tue, 17 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/ZhengWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2018, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6}, doi = {10.1007/978-3-319-89339-6}, isbn = {978-3-319-89338-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.