000 04462nam a22006375i 4500
001 978-3-319-89339-6
003 DE-He213
005 20240730175913.0
007 cr nn 008mamaa
008 180405s2018 sz | s |||| 0|eng d
020 _a9783319893396
_9978-3-319-89339-6
024 7 _a10.1007/978-3-319-89339-6
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aProgress in Cryptology - AFRICACRYPT 2018
_h[electronic resource] :
_b10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings /
_cedited by Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXII, 363 p. 51 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v10831
505 0 _aA Complete Characterization of Plateaued Boolean Functions in Terms of Their Cayley Graphs -- Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications -- Ubiquitous Weak-key Classes of BRW-polynomial Function -- Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count -- Two Simple Composition Theorems with H-coefficients -- Improved Related-Tweakey Boomerang Attacks on Deoxys-BC -- SCA-Resistance for AES: How Cheap Can We Go -- Cryptanalysis of 1-Round KECCAK -- Performing Computations on Hierarchically Shared Secrets -- Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge -- Unified Formulas for Some Deterministic Almost-injective Encodings into Hyperelliptic Curves -- HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction -- Large FHE Gates from Tensored Homomorphic Accumulator -- Two-Face: New Public Key Multivariate Schemes -- Cryptanalysis of RSA Variants with Modidied Euler Quotient -- Saber: Module-LWR Based Key Exchange, CPA-secure Encryption and CCA-secure KEM -- Practical Fault Injection on Deterministic Signatures: The Case of EdDSA -- Authentication with Weaker Trust Assumptions for Voting Systems -- Shorter Double-authentication Preventing Signatures for Small Address Spaces.
520 _aThis book constitutes the refereed proceedings of the 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018, held in Marrakesh, Morocco, in May 2018. The 19 papers presented in this book were carefully reviewed and selected from 54 submissions. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).
650 0 _aData protection.
_97245
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 0 _aComputers.
_98172
650 0 _aComputer networks .
_931572
650 1 4 _aData and Information Security.
_931990
650 2 4 _aData Structures and Information Theory.
_931923
650 2 4 _aComputer Hardware.
_933420
650 2 4 _aComputer Communication Networks.
_9118228
650 2 4 _aComputing Milieux.
_955441
700 1 _aJoux, Antoine.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9118229
700 1 _aNitaj, Abderrahmane.
_eeditor.
_0(orcid)
_10000-0002-0372-1757
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9118230
700 1 _aRachidi, Tajjeeddine.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9118231
710 2 _aSpringerLink (Online service)
_9118232
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319893389
776 0 8 _iPrinted edition:
_z9783319893402
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v10831
_9118233
856 4 0 _uhttps://doi.org/10.1007/978-3-319-89339-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c90094
_d90094