default search action
12th AFRICACRYPT 2020: Cairo, Egypt
- Abderrahmane Nitaj, Amr M. Youssef:
Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings. Lecture Notes in Computer Science 12174, Springer 2020, ISBN 978-3-030-51937-7
Zero Knowledge
- Carla Ràfols, Javier Silva:
QA-NIZK Arguments of Same Opening for Bilateral Commitments. 3-23 - Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols:
Signatures of Knowledge for Boolean Circuits Under Standard Assumptions. 24-44 - Jean-François Biasse, Giacomo Micheli, Edoardo Persichetti, Paolo Santini:
LESS is More: Code-Based Signatures Without Syndromes. 45-65 - Aditya Damodaran, Alfredo Rial:
UC Updatable Databases and Applications. 66-87
Symmetric Key Cryptography
- Mohamed Tolba, Muhammad ElSheikh, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. 91-113 - Xin An, Kai Hu, Meiqin Wang:
MixColumns Coefficient Property and Security of the AES with A Secret S-Box. 114-131 - Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan:
New Results on the SymSum Distinguisher on Round-Reduced SHA3. 132-151 - Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Cryptanalysis of FlexAEAD. 152-171 - Avijit Dutta, Mridul Nandi:
BBB Secure Nonce Based MAC Using Public Permutations. 172-191
Elliptic Curves
- Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper:
On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol. 195-213 - Monika Trimoska, Sorina Ionica, Gilles Dequen:
A SAT-Based Approach for Index Calculus on Binary Elliptic Curves. 214-235
Post Quantum Cryptography
- Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver:
Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security. 239-257 - Fabio Campos, Tim Kohlstadt, Steffen Reith, Marc Stöttinger:
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4. 258-277
Lattice Based Cryptography
- Meenakshi Kansal, Ratna Dutta:
Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression. 281-300 - Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger:
Sieve, Enumerate, Slice, and Lift: - Hybrid Lattice Algorithms for SVP via CVPP. 301-320
Side Channel Attacks
- Niels Roelofs, Niels Samwel, Lejla Batina, Joan Daemen:
Online Template Attack on ECDSA: - Extracting Keys via the Other Side. 323-336 - Unai Rioja, Lejla Batina, Igor Armendariz:
When Similarities Among Devices are Taken for Granted: Another Look at Portability. 337-357
Cryptanalysis
- Gabrielle De Micheli, Rémi Piau, Cécile Pierrot:
A Tale of Three Signatures: Practical Attack of ECDSA with wNAF. 361-381 - Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd Ghafar, Muhammad Asyraf Asbullah:
Attacking RSA Using an Arbitrary Parameter. 382-399
New Algorithms and Schemes
- Aaron Hutchinson, Koray Karabina:
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder. 403-422 - Gérald Gavin, Sandrine Tainturier:
New Ideas to Build Noise-Free Homomorphic Cryptosystems. 423-451
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.