Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
DOI10.1007/978-3-642-12678-9zbMATH Open1186.94003DBLPconf/africacrypt/2010OpenAlexW2150115721WikidataQ27996448 ScholiaQ27996448MaRDI QIDQ968101FDOQ968101
Author name not available (Why is that?)
Publication date: 4 May 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-12678-9
Cryptography (94A60) Proceedings of conferences of miscellaneous specific interest (00B25) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Cited In (25)
- Proofs of Restricted Shuffles
- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes
- Differential Fault Analysis of HC-128
- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
- Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
- Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
- Optimistic Fair Priced Oblivious Transfer
- Batch Range Proof for Practical Small Ranges
- Parallelizing the Camellia and SMS4 Block Ciphers
- ECC2K-130 on Cell CPUs
- Parallel Shortest Lattice Vector Enumeration on Graphics Cards
- Quantum Readout of Physical Unclonable Functions
- Strong Cryptography from Weak Secrets
- Fair Partially Blind Signatures
- Avoiding Full Extension Field Arithmetic in Pairing Computations
- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
- Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits
- A New RSA-Based Signature Scheme
- Efficient Unidirectional Proxy Re-Encryption
- Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over $\mathbb{F}_2$
- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
- Improved Linear Differential Attacks on CubeHash
- Fair Blind Signatures without Random Oracles
This page was built for publication: Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q968101)