Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings

From MaRDI portal
Publication:968101

DOI10.1007/978-3-642-12678-9zbMATH Open1186.94003DBLPconf/africacrypt/2010OpenAlexW2150115721WikidataQ27996448 ScholiaQ27996448MaRDI QIDQ968101

Author name not available (Why is that?)

Publication date: 4 May 2010

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-12678-9






Related Items (25)

A New RSA-Based Signature SchemeFair Blind Signatures without Random OraclesFair Partially Blind SignaturesParallel Shortest Lattice Vector Enumeration on Graphics CardsFlexible Partial Enlargement to Accelerate Gröbner Basis Computation over $\mathbb{F}_2$Factoring RSA Modulus Using Prime Reconstruction from Random Known BitsProofs of Restricted ShufflesBatch Range Proof for Practical Small RangesOptimistic Fair Priced Oblivious TransferInformation-Theoretically Secure Key-Insulated Multireceiver Authentication CodesSimple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission SchemesCommunication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal ResilienceAvoiding Full Extension Field Arithmetic in Pairing ComputationsECC2K-130 on Cell CPUsPractical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-AcceleratorDifferential Fault Analysis of HC-128Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost DevicesStrong Cryptography from Weak SecretsEfficient Unidirectional Proxy Re-EncryptionPublic-Key Encryption with Non-Interactive Opening: New Constructions and Stronger DefinitionsFlexible Group Key Exchange with On-demand Computation of Subgroup KeysQuantum Readout of Physical Unclonable FunctionsParallelizing the Camellia and SMS4 Block CiphersImproved Linear Differential Attacks on CubeHashCryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512






This page was built for publication: Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q968101)