Progress in Cryptology - AFRICACRYPT 2010 Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6055 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Signatures
- A New RSA-Based Signature Scheme
- Fair Blind Signatures without Random Oracles
- Fair Partially Blind Signatures
- Attacks
- Parallel Shortest Lattice Vector Enumeration on Graphics Cards
- Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over
- Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits
- Protocols
- Proofs of Restricted Shuffles
- Batch Range Proof for Practical Small Ranges
- Optimistic Fair Priced Oblivious Transfer
- Networks
- Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes
- Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
- Elliptic Curves
- Avoiding Full Extension Field Arithmetic in Pairing Computations
- ECC2K-130 on Cell CPUs
- Side-Channel Attacks and Fault Attacks
- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
- Differential Fault Analysis of HC-128
- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
- Public-Key Encryption
- Strong Cryptography from Weak Secrets
- Efficient Unidirectional Proxy Re-Encryption
- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
- Keys and PUFs
- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
- Quantum Readout of Physical Unclonable Functions
- Ciphers and Hash Functions
- Parallelizing the Camellia and SMS4 Block Ciphers
- Improved Linear Differential Attacks on CubeHash
- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.