Cargando…

Progress in Cryptology - AFRICACRYPT 2010 Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Bernstein, Daniel J. (Editor ), Lange, Tanja (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6055
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Signatures
  • A New RSA-Based Signature Scheme
  • Fair Blind Signatures without Random Oracles
  • Fair Partially Blind Signatures
  • Attacks
  • Parallel Shortest Lattice Vector Enumeration on Graphics Cards
  • Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over
  • Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits
  • Protocols
  • Proofs of Restricted Shuffles
  • Batch Range Proof for Practical Small Ranges
  • Optimistic Fair Priced Oblivious Transfer
  • Networks
  • Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
  • Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes
  • Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
  • Elliptic Curves
  • Avoiding Full Extension Field Arithmetic in Pairing Computations
  • ECC2K-130 on Cell CPUs
  • Side-Channel Attacks and Fault Attacks
  • Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
  • Differential Fault Analysis of HC-128
  • Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
  • Public-Key Encryption
  • Strong Cryptography from Weak Secrets
  • Efficient Unidirectional Proxy Re-Encryption
  • Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
  • Keys and PUFs
  • Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
  • Quantum Readout of Physical Unclonable Functions
  • Ciphers and Hash Functions
  • Parallelizing the Camellia and SMS4 Block Ciphers
  • Improved Linear Differential Attacks on CubeHash
  • Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.