


default search action
16th AFRICACRYPT 2025: Rabat, Morocco
- Abderrahmane Nitaj
, Svetla Petkova-Nikova
, Vincent Rijmen
:
Progress in Cryptology - AFRICACRYPT 2025 - 16th International Conference on Cryptology in Africa, Rabat, Morocco, July 21-23, 2025, Proceedings. Lecture Notes in Computer Science 15651, Springer 2026, ISBN 978-3-031-97259-1
Homomorphic Encryption
- Axel Mertens
, Georgio Nicolas
, Sergi Rovira:
Convolution-Friendly Image Compression with FHE. 3-24 - Mahdi Mahdavi, Ehsan Meamari, Emad Heydari Beni, Maryam Sheikhi:
Leveled Homomorphic Encryption over Composite Groups. 25-50 - Nges Brian Njungle
, Michel A. Kinsy:
Activate Me!: Designing Efficient Activation Functions for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption. 51-73 - Mahdi Mahdavi
, Helena Rifà-Pous
:
One-Way Homomorphic Encryption: A Composite Group Approach. 74-88
Cryptanalysis of RSA
- Mengce Zheng
, Abderrahmane Nitaj:
A Novel Partial Key Exposure Attack on Common Prime RSA. 91-112 - Mohammed Rahmani, Abderrahmane Nitaj:
Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve. 113-125 - Michel Seck, Oumar Niang, Djiby Sow, Abderrahmane Nitaj, Mengce Zheng, Maher Boudabra:
A New Generalized Attack on RSA-Like Cryptosystems. 126-144
Cryptography Arithmetic
- Nour-eddine Rahmani, Taoufik Serraj, Moulay Chrif Ismaili:
An Improvement of the Congruence Solver of Lattice Isomorphism Problem over Totally Real Number Fields and Applications. 147-163 - Fangan-Yssouf Dosso
, Sylvain Duquesne
, Nadia El Mrabet
, Emma Gautier:
PMNS Arithmetic for Elliptic Curve Cryptography. 164-191 - Fatna Kouider, Anisha Mukherjee
, David Jacquemin, Péter Kutas:
Constant-Time Integer Arithmetic for SQIsign. 192-215 - Xiaowen Hu, Hanyu Wei, Hengchuan Zou, Zhichuang Liang, Wenqian Li, Yunlei Zhao:
FPTRU: Optimization of NTRU-Prime and TLS Performance Assessment. 216-241
Side-channel Attacks
- Anisha Mukherjee
, Maciej Czuprynko
, David Jacquemin, Péter Kutas, Sujoy Sinha Roy:
Simple Power Analysis Attack on SQIsign. 245-269 - Maciej Czuprynko
, Anisha Mukherjee
, Sujoy Sinha Roy:
Correlation Power Analysis of LESS and CROSS. 270-295 - Sumesh Manjunath Ramesh
, Hoda Alkhzaimi:
TPL: Power Leakage Model Based on Technology Library. 296-316
Designs
- Daniel Augot, Olivier Blazy, Hugo Delavenne, Lola-Baie Mallordy:
Bivariate Proximity Test-Based Asynchronous Verifiable Secret Sharing. 319-342 - István András Seres, Péter Burcsi:
Behemoth: Transparent Polynomial Commitment Scheme with Constant Opening Proof Size and Verifier Time. 343-369 - Arani Raychaudhuri, Ramprasad Sarkar
, Mriganka Mandal
:
Attribute-Based Encryption Using Sum-Product Decomposition of Boolean Functions. 370-394 - Dimitri Koshelev
:
Simultaneously Simple Universal and Indifferentiable Hashing to Elliptic Curves. 395-413
Cryptanalysis
- Bibhas Chandra Das
:
Conjunctive Dynamic SSE Schemes Under Scrutiny: Exposing Privacy Issues in SDSSE-CQ-S and VCDSSE. 417-440 - Anirudh Aitipamula, Debranjan Pal, Dipanwita Roy Chowdhury:
Efficient and Optimized Modeling of S-Boxes. 441-469 - Solane El Hirch, Frank Custers, Christine van Vredendaal:
Tearing Solutions for Tree Traversal in Stateful Hash-Based Cryptography. 470-492

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.