Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
DOI10.1007/978-3-642-12678-9zbMATH Open1186.94003DBLPconf/africacrypt/2010OpenAlexW2150115721WikidataQ27996448 ScholiaQ27996448MaRDI QIDQ968101FDOQ968101
Authors:
Publication date: 4 May 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-12678-9
Cryptography (94A60) Proceedings of conferences of miscellaneous specific interest (00B25) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Cited In (25)
- Optimistic fair priced oblivious transfer
- Batch range proof for practical small ranges
- Parallelizing the Camellia and SMS4 block ciphers
- Proofs of Restricted Shuffles
- Parallel shortest lattice vector enumeration on graphics cards
- Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords
- Fair partially blind signatures
- Avoiding full extension field arithmetic in pairing computations
- Flexible group key exchange with on-demand computation of subgroup keys
- Factoring RSA modulus using prime reconstruction from random known bits
- A new RSA-based signature scheme
- Quantum readout of physical unclonable functions
- Flexible partial enlargement to accelerate Gröbner basis computation over \(\mathbb{F}_2\)
- ECC2K-130 on Cell CPUs
- Public-key encryption with non-interactive opening: new constructions and stronger definitions
- Fair blind signatures without random oracles
- Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator
- Simple and communication complexity efficient almost secure and perfectly secure message transmission schemes
- Differential fault analysis of HC-128
- Fresh re-keying: security against side-channel and fault attacks for low-cost devices
- Efficient Unidirectional Proxy Re-Encryption
- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
- Communication efficient perfectly secure VSS and MPC in asynchronous networks with optimal resilience
- Information-theoretically secure key-insulated multireceiver authentication codes
- Improved Linear Differential Attacks on CubeHash
This page was built for publication: Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q968101)