


default search action
9. AFRICACRYPT 2017: Dakar, Senegal
- Marc Joye, Abderrahmane Nitaj:

Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Lecture Notes in Computer Science 10239, 2017, ISBN 978-3-319-57338-0
Cryptographic Schemes
- Mohamed Saied Emam Mohamed, Albrecht Petzoldt:

RingRainbow - An Efficient Multivariate Ring Signature Scheme. 3-20 - Meilof Veeningen:

Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation. 21-39 - Liqun Chen

, Thalia M. Laing, Keith M. Martin:
Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme. 40-57
Side-Channel Analysis
- Stjepan Picek, Annelie Heuser, Alan Jovic

, Axel Legay:
Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks. 61-78 - Milena Djukanovic, Davide Bellizia

, Giuseppe Scotti, Alessandro Trifiletti:
Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications. 79-94 - Haruhisa Kosuge, Hidema Tanaka:

Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration. 95-113
Differential Cryptanalysis
- Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:

Impossible Differential Cryptanalysis of Reduced-Round SKINNY. 117-134 - Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:

Impossible Differential Attack on Reduced Round SPARX-64/128. 135-146
Applications
- Tushar Kanti Saha

, Takeshi Koshiba
:
Private Conjunctive Query over Encrypted Data. 149-164 - Isheeta Nargis:

Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption. 165-183 - Joppe W. Bos, Wouter Castryck

, Ilia Iliashenko
, Frederik Vercauteren
:
Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data Handling. 184-201
Number Theory
- Michel Seck

, Hortense Boudjou, Nafissatou Diarra, Ahmed Youssef Ould Cheikh Khlil:
On Indifferentiable Hashing into the Jacobian of Hyperelliptic Curves of Genus 2. 205-222 - Mohammad Eftekhari:

Cryptanalysis of Some Protocols Using Matrices over Group Rings. 223-229

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














