


default search action
12th AFRICACRYPT 2020: Cairo, Egypt
- Abderrahmane Nitaj

, Amr M. Youssef:
Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings. Lecture Notes in Computer Science 12174, Springer 2020, ISBN 978-3-030-51937-7
Zero Knowledge
- Carla Ràfols

, Javier Silva:
QA-NIZK Arguments of Same Opening for Bilateral Commitments. 3-23 - Karim Baghery

, Alonso González, Zaira Pindado, Carla Ràfols
:
Signatures of Knowledge for Boolean Circuits Under Standard Assumptions. 24-44 - Jean-François Biasse

, Giacomo Micheli
, Edoardo Persichetti
, Paolo Santini
:
LESS is More: Code-Based Signatures Without Syndromes. 45-65 - Aditya Damodaran

, Alfredo Rial
:
UC Updatable Databases and Applications. 66-87
Symmetric Key Cryptography
- Mohamed Tolba, Muhammad ElSheikh

, Amr M. Youssef:
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE. 91-113 - Xin An, Kai Hu, Meiqin Wang:

MixColumns Coefficient Property and Security of the AES with A Secret S-Box. 114-131 - Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan

:
New Results on the SymSum Distinguisher on Round-Reduced SHA3. 132-151 - Mostafizar Rahman, Dhiman Saha, Goutam Paul:

Cryptanalysis of FlexAEAD. 152-171 - Avijit Dutta, Mridul Nandi:

BBB Secure Nonce Based MAC Using Public Permutations. 172-191
Elliptic Curves
- Andrea Basso

, Péter Kutas
, Simon-Philipp Merz
, Christophe Petit
, Charlotte Weitkämper:
On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol. 195-213 - Monika Trimoska, Sorina Ionica, Gilles Dequen:

A SAT-Based Approach for Index Calculus on Binary Elliptic Curves. 214-235
Post Quantum Cryptography
- Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver:

Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security. 239-257 - Fabio Campos

, Tim Kohlstadt, Steffen Reith, Marc Stöttinger
:
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4. 258-277
Lattice Based Cryptography
- Meenakshi Kansal, Ratna Dutta:

Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression. 281-300 - Emmanouil Doulgerakis, Thijs Laarhoven

, Benne de Weger:
Sieve, Enumerate, Slice, and Lift: - Hybrid Lattice Algorithms for SVP via CVPP. 301-320
Side Channel Attacks
- Niels Roelofs, Niels Samwel

, Lejla Batina, Joan Daemen:
Online Template Attack on ECDSA: - Extracting Keys via the Other Side. 323-336 - Unai Rioja

, Lejla Batina, Igor Armendariz
:
When Similarities Among Devices are Taken for Granted: Another Look at Portability. 337-357
Cryptanalysis
- Gabrielle De Micheli

, Rémi Piau
, Cécile Pierrot:
A Tale of Three Signatures: Practical Attack of ECDSA with wNAF. 361-381 - Muhammad Rezal Kamel Ariffin

, Amir Hamzah Abd Ghafar
, Muhammad Asyraf Asbullah
:
Attacking RSA Using an Arbitrary Parameter. 382-399
New Algorithms and Schemes
- Aaron Hutchinson, Koray Karabina:

A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder. 403-422 - Gérald Gavin, Sandrine Tainturier:

New Ideas to Build Noise-Free Homomorphic Cryptosystems. 423-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














