default search action
10th AFRICACRYPT 2019: Rabat, Morocco
- Johannes Buchmann, Abderrahmane Nitaj, Tajje-eddine Rachidi:
Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings. Lecture Notes in Computer Science 11627, Springer 2019, ISBN 978-3-030-23695-3
Protocols
- Jacob Appelbaum, Chloe Martindale, Peter Wu:
Tiny WireGuard Tweak. 3-20 - Sébastien Canard, Loïc Ferreira:
Extended 3-Party \textACCE and Application to LoRaWAN 1.1. 21-38
Post-quantum Cryptography
- Alessandro Budroni, Andrea Tenti:
The Mersenne Low Hamming Combination Search Problem Can Be Reduced to an ILP Problem. 41-55 - Vanessa Vitse:
Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies. 56-78 - Hamad Al Shehhi, Emanuele Bellini, Filipe Borba, Florian Caullery, Marc Manzano, Víctor Mateu:
An IND-CCA-Secure Code-Based Encryption Scheme Using Rank Metric. 79-96
Zero-Knowledge
- Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac:
UC-Secure CRS Generation for SNARKs. 99-117 - Karim Baghery:
On the Efficiency of Privacy-Preserving Smart Contract Systems. 118-136
Lattice Based Cryptography
- Dipayan Das, Man Ho Au, Zhenfei Zhang:
Ring Signatures Based on Middle-Product Learning with Errors Problems. 139-156 - Michael Walter:
Sampling the Integers with Low Relative Error. 157-180 - Shi Bai, Shaun Miller, Weiqiang Wen:
A Refined Analysis of the Cost for Solving LWE via uSVP. 181-205
New Schemes and Analysis
- Leon Botros, Matthias J. Kannwischer, Peter Schwabe:
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4. 209-228 - Francesco Berti, Olivier Pereira, François-Xavier Standaert:
Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher. 229-249 - Youssef Harmouch, Rachid El Kouch, Hussain Ben-Azza:
An Improvement of Correlation Analysis for Vectorial Boolean Functions. 250-269
Block Ciphers
- Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef:
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. 273-296 - Navid Ghaedi Bardeh, Sondre Rønjom:
Practical Attacks on Reduced-Round AES. 297-310 - Fatih Balli, Subhadeep Banik:
Six Shades of AES. 311-329
Side-Channel Attacks and Countermeasures
- Clément Massart, François-Xavier Standaert:
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint. 333-351 - Sumesh Manjunath Ramesh, Hoda Alkhzaimi:
Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures. 352-369 - Ke Wang, Haodong Jiang:
Analysis of Two Countermeasures Against the Signal Leakage Attack. 370-388
Signatures
- Gustavo Zambonin, Matheus S. P. Bittencourt, Ricardo Felipe Custódio:
Handling Vinegar Variables to Shorten Rainbow Key Pairs. 391-408 - Essam Ghadafi:
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups. 409-428 - Lydia Garms, Elizabeth A. Quaglia:
A New Approach to Modelling Centralised Reputation Systems. 429-447
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.