E-Book, Englisch, Band 11627, 449 Seiten, eBook
11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings
E-Book, Englisch, Band 11627, 449 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-030-23696-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Protocols.-
Tiny WireGuard Tweak.- Extended 3-Party ACCE and Application to LoRaWAN 1.1.-
Post-Quantum Cryptography.-
The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem.- Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies.- An IND-CCA-Secure Code-Based Encryption Scheme Using Rank Metric.-
Zero-Knowledge.-
UC-Secure CRS Generation for SNARKs.- On the Efficiency of Privacy-Preserving Smart Contract Systems.-
Lattice Based Cryptography.-
Ring Signatures based on Middle-Product Learning with Errors Problems.- Sampling the Integers with Low Relative Error.- A Refined Analysis of the Cost for Solving LWE via uSVP.-
New Schemes and Analysis.-
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4.- Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher.- An Improvement of Correlation Analysis for Vectorial Boolean Functions.-
Block Ciphers.-
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T.- Practical Attacks on Reduced-Round AES.- Six Shades of AES.-
Side-Channel Attacks and Countermeasures.-
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint.- Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures.- Analysis of Two Countermeasures against the Signal Leakage Attack.-
Signatures.-
Handling Vinegar Variables to Shorten Rainbow Key Pairs.- Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups.- A New Approach to Modelling Centralised Reputation Systems.