


default search action
3. AFRICACRYPT 2010: Stellenbosch, South Africa
- Daniel J. Bernstein, Tanja Lange:

Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings. Lecture Notes in Computer Science 6055, Springer 2010, ISBN 978-3-642-12677-2
Signatures
- Sven Schäge

, Jörg Schwenk:
A New RSA-Based Signature Scheme. 1-15 - Georg Fuchsbauer, Damien Vergnaud

:
Fair Blind Signatures without Random Oracles. 16-33 - Markus Rückert, Dominique Schröder

:
Fair Partially Blind Signatures. 34-51
Attacks
- Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren

, Bart Preneel
:
Parallel Shortest Lattice Vector Enumeration on Graphics Cards. 52-68 - Johannes Buchmann, Daniel Cabarcas, Jintai Ding

, Mohamed Saied Emam Mohamed:
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2. 69-81 - Subhamoy Maitra, Santanu Sarkar

, Sourav Sen Gupta
:
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits. 82-99
Protocols
- Björn Terelius, Douglas Wikström:

Proofs of Restricted Shuffles. 100-113 - Kun Peng, Feng Bao:

Batch Range Proof for Practical Small Ranges. 114-130 - Alfredo Rial, Bart Preneel

:
Optimistic Fair Priced Oblivious Transfer. 131-147
Networks
- Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsutomu Matsumoto:

Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. 148-165 - Yvo Desmedt, Stelios Erotokritou, Reihaneh Safavi-Naini:

Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes. 166-183 - Arpita Patra, Ashish Choudhary

, C. Pandu Rangan:
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience. 184-202
Elliptic Curves
- Craig Costello

, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong
:
Avoiding Full Extension Field Arithmetic in Pairing Computations. 203-224 - Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe:

ECC2K-130 on Cell CPUs. 225-242
Side-Channel Attacks and Fault Attacks
- M. Abdelaziz Elaabid, Sylvain Guilley:

Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator. 243-260 - Aleksandar Kircanski, Amr M. Youssef:

Differential Fault Analysis of HC-128. 261-278 - Marcel Medwed, François-Xavier Standaert

, Johann Großschädl, Francesco Regazzoni
:
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices. 279-296
Public-Key Encryption
- Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, David Pointcheval

:
Strong Cryptography from Weak Secrets. 297-315 - Sherman S. M. Chow

, Jian Weng
, Yanjiang Yang, Robert H. Deng
:
Efficient Unidirectional Proxy Re-Encryption. 316-332 - David Galindo

, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis
, Dominique Schröder
:
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. 333-350
Keys and PUFs
- Michel Abdalla

, Céline Chevalier, Mark Manulis
, David Pointcheval
:
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. 351-368 - Boris Skoric:

Quantum Readout of Physical Unclonable Functions. 369-386
Ciphers and Hash Functions
- Huihui Yap, Khoongming Khoo, Axel Poschmann:

Parallelizing the Camellia and SMS4 Block Ciphers. 387-406 - Shahram Khazaei

, Simon Knellwolf, Willi Meier, Deian Stefan:
Improved Linear Differential Attacks on CubeHash. 407-418 - Praveen Gauravaram

, Gaëtan Leurent
, Florian Mendel
, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer:
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. 419-436

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














