E-Book, Englisch, 363 Seiten, eBook
Reihe: Security and Cryptology
10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings
E-Book, Englisch, 363 Seiten, eBook
Reihe: Security and Cryptology
ISBN: 978-3-319-89339-6
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
A Complete Characterization of Plateaued Boolean Functions in Terms of Their Cayley Graphs.- Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications.- Ubiquitous Weak-key Classes of BRW-polynomial Function.- Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count.- Two Simple Composition Theorems with H-coefficients.- Improved Related-Tweakey Boomerang Attacks on Deoxys-BC.- SCA-Resistance for AES: How Cheap Can We Go.- Cryptanalysis of 1-Round KECCAK.- Performing Computations on Hierarchically Shared Secrets.- Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge.- Unified Formulas for Some Deterministic Almost-injective Encodings into Hyperelliptic Curves.- HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction.- Large FHE Gates from Tensored Homomorphic Accumulator.- Two-Face: New Public Key Multivariate Schemes.- Cryptanalysis of RSA Variants with Modidied Euler Quotient.- Saber: Module-LWR Based Key Exchange, CPA-secure Encryption and CCA-secure KEM.- Practical Fault Injection on Deterministic Signatures: The Case of EdDSA.- Authentication with Weaker Trust Assumptions for Voting Systems.- Shorter Double-authentication Preventing Signatures for Small Address Spaces.