Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. (English) Zbl 1241.94006

Lecture Notes in Computer Science 7374. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). xi, 424 p. (2012).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see Zbl 1216.94004.
Indexed articles:
Karati, Sabyasachi; Das, Abhijit; Roychowdhury, Dipanwita; Bellur, Bhargav; Bhattacharya, Debojyoti; Iyer, Aravind, Batch verification of ECDSA signatures, 1-18 [Zbl 1291.94190]
El Yousfi Alaoui, Sidi Mohamed; Dagdelen, Özgür; Véron, Pascal; Galindo, David; Cayrel, Pierre-Louis, Extended security arguments for signature schemes, 19-34 [Zbl 1291.94185]
Canard, Sébastien; Jambert, Amandine; Lescuyer, Roch, Sanitizable signatures with several signers and sanitizers, 35-52 [Zbl 1304.94098]
Wang, Jingjing; Li, Xiangxue; Chen, Kefei; Zhang, Wenzheng, Attack based on direct sum decomposition against the nonlinear filter generator, 53-66 [Zbl 1304.94091]
Bringer, Julien; Chabanne, Hervé; Favre, Mélanie, Fuzzy vault for multiple users, 67-81 [Zbl 1304.94037]
Safavi-Naini, Reihaneh; Tuhin, Mohammed Ashraful Alam, Bounds and constructions for \(1\)-round \((0,\delta )\)-secure message transmission against generalized adversary, 82-98 [Zbl 1304.94082]
Meziani, Mohammed; Hoffmann, Gerhard; Cayrel, Pierre-Louis, Improving the performance of the SYND stream cipher, 99-116 [Zbl 1304.94076]
Chen, Jiazhe; Wang, Meiqin; Preneel, Bart, Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT, 117-137 [Zbl 1304.94039]
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo, Three-subset meet-in-the-middle attack on reduced XTEA, 138-154 [Zbl 1304.94083]
Sun, Yue; Wang, Meiqin; Jiang, Shujia; Sun, Qiumei, Differential cryptanalysis of reduced-round ICEBERG, 155-171 [Zbl 1304.94089]
Eisenbarth, Thomas; Gong, Zheng; Güneysu, Tim; Heyse, Stefan; Indesteege, Sebastiaan; Kerckhof, Stéphanie; Koeune, François; Nad, Tomislav; Plos, Thomas; Regazzoni, Francesco; Standaert, François-Xavier; van Oldeneel tot Oldenzeel, Loic, Compact implementation and performance evaluation of block ciphers in ATtiny devices, 172-187 [Zbl 1304.94052]
Thomae, Enrico; Wolf, Christopher, Cryptanalysis of enhanced TTS, STS and all its variants, or: why cross-terms are important, 188-202 [Zbl 1304.94090]
Sarr, Augustin P.; Elbaz-Vincent, Philippe, A complementary analysis of the (s)YZ and DIKE protocols, 203-220 [Zbl 1304.94107]
Nitaj, Abderrahmane, A new attack on RSA and CRT-RSA, 221-233 [Zbl 1304.94077]
Armknecht, Frederik; Katzenbeisser, Stefan; Peter, Andreas, Shift-type homomorphic encryption and its application to fully homomorphic encryption, 234-251 [Zbl 1304.94033]
Fleischmann, Ewan; Forler, Christian; Lucks, Stefan, The collision security of MDC-4, 252-269 [Zbl 1304.94057]
Choy, Jiali; Yap, Huihui; Khoo, Khoongming; Guo, Jian; Peyrin, Thomas; Poschmann, Axel; Tan, Chik How, SPN-hash: improving the provable resistance against differential collision attacks, 270-286 [Zbl 1304.94041]
Andreeva, Elena; Mennink, Bart; Preneel, Bart; Škrobot, Marjan, Security analysis and comparison of the SHA-3 finalists BLAKE, Grøstl, JH, Keccak, and Skein, 287-305 [Zbl 1291.94046]
Berger, Thierry P.; D’Hayer, Joffrey; Marquet, Kevin; Minier, Marine; Thomas, Gaël, The GLUON family: a lightweight hash function family based on FCSRs, 306-323 [Zbl 1291.94057]
Schwabe, Peter; Yang, Bo-Yin; Yang, Shang-Yi, SHA-3 on ARM11 processors, 324-341 [Zbl 1291.94151]
Mohamed, Nashwa A. F.; Hashim, Mohsin H. A.; Hutter, Michael, Improved fixed-base comb method for fast scalar multiplication, 342-359 [Zbl 1291.94134]
Maghrebi, Houssem; Carlet, Claude; Guilley, Sylvain; Danger, Jean-Luc, Optimal first-order masking with linear and non-linear bijections, 360-377 [Zbl 1291.94123]
D’Arco, Paolo; González Vasco, María Isabel; Pérez del Pozo, Angel L.; Soriente, Claudio, Size-hiding in private set intersection: existential results and constructions, 378-394 [Zbl 1291.94073]
Xiao, David, Round-optimal black-box statistically binding selective-opening secure commitments, 395-411 [Zbl 1291.94169]
Meier, Willi, Stream ciphers, a perspective. (Abstract), 412 [Zbl 1291.94128]
Fischlin, Marc, Black-box reductions and separations in cryptography, 413-422 [Zbl 1291.94081]


94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest


Zbl 1216.94004


Full Text: DOI