


default search action
13th AFRICACRYPT 2022: Fes, Morocco
- Lejla Batina

, Joan Daemen
:
Progress in Cryptology - AFRICACRYPT 2022: 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18-20, 2022, Proceedings. Lecture Notes in Computer Science 13503, Springer Nature Switzerland 2022, ISBN 978-3-031-17433-9 - Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta

:
Construction of Recursive MDS Matrices Using DLS Matrices. 3-27 - Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta

:
FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix. 28-52 - Andrea Caforio, Daniel Collins, Subhadeep Banik, Francesco Regazzoni

:
A Small GIFT-COFB: Lightweight Bit-Serial Architectures. 53-77 - Olivier Blazy

, Saqib A. Kakvi
:
Identity-Based Encryption in DDH Hard Groups. 81-102 - Marloes Venema

, Greg Alpár:
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks. 103-129 - Raghvendra Rohit, Santanu Sarkar:

Cryptanalysis of Reduced Round SPEEDY. 133-149 - Loïc Rouquette, David Gérault, Marine Minier, Christine Solnon:

And Rijndael?: Automatic Related-Key Differential Analysis of Rijndael. 150-175 - Christina Boura, Rachelle Heim Boissier, Yann Rotella:

Breaking Panther. 176-188 - Muzhou Li

, Ling Sun, Meiqin Wang:
Automated Key Recovery Attacks on Round-Reduced Orthros. 189-213 - Joppe W. Bos

, Joost Renes
, Amber Sprenkels
:
Dilithium for Memory Constrained Devices. 217-235 - Veronika Kuchta, Rajeev Anand Sahu

, Gaurav Sharma:
Lattice-Based Inner Product Argument. 236-268 - Ruben Niederhagen, Johannes Roth

, Julian Wälde:
Streaming SPHINCS+ for Embedded Devices Using the Example of TPMs. 269-291 - Bénédikt Tran

, Serge Vaudenay:
Solving the Learning Parity with Noise Problem Using Quantum Algorithms. 295-322 - Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier A. Verbel:

An Estimator for the Hardness of the MQ Problem. 323-347 - Thomas Aulbach, Tobias Kovats, Juliane Krämer, Soundes Marzougui:

Recovering Rainbow's Secret Key with a First-Order Fault Attack. 348-368 - Suvadeep Hajra, Sayandeep Saha, Manaar Alam

, Debdeep Mukhopadhyay:
TransNet: Shift Invariant Transformer Network for Side Channel Analysis. 371-396 - Azade Rezaeezade, Guilherme Perin, Stjepan Picek:

To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA. 397-421 - Mónica P. Arenas

, Muhammed Ali Bingöl
, Hüseyin Demirci
, Georgios Fotiadis
, Gabriele Lenzini
:
A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption. 425-447 - Rikuo Haga

, Yuichi Hayashi
, Daiki Miyahara
, Takaaki Mizuki
:
Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards. 448-468 - Marc Fischlin, Felix Rohrbach

, Tobias Schmalz
:
A Random Oracle for All of Us. 469-489 - Vladimir Sedlacek

, Vojtech Suchanek, Antonin Dufka
, Marek Sýs
, Vashek Matyas:
DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits. 493-517 - Youssef El Housni

, Aurore Guillevic
, Thomas Piellard:
Co-factor Clearing and Subgroup Membership Testing on Pairing-Friendly Curves. 518-536 - Abderrahmane Nitaj, Willy Susilo

, Joseph Tonien
:
A Generalized Attack on the Multi-prime Power RSA. 537-549 - Laila El Aimani

:
Finding Low-Weight Polynomial Multiples Using the Rho Method. 550-575 - Jinzheng Cao

, Qingfeng Cheng
, Jian Weng
:
EHNP Strikes Back: Analyzing SM2 Implementations. 576-600

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














