Progress in Cryptology – AFRICACRYPT 2009 Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings /
This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009. The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Σειρά: | Lecture Notes in Computer Science,
5580 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Hash Functions
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
- Cryptanalysis of Vortex
- Two Passes of Tiger Are Not One-Way
- Block Ciphers
- Generic Attacks on Feistel Networks with Internal Permutations
- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks
- Asymmetric Encryption
- Reducing Key Length of the McEliece Cryptosystem
- Cryptanalysis of RSA Using the Ratio of the Primes
- Digital Signatures
- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
- A Schnorr-Like Lightweight Identity-Based Signature Scheme
- On the Theoretical Gap between Group Signatures with and without Unlinkability
- Practical Threshold Signatures with Linear Secret Sharing Schemes
- Asymmetric Encryption and Anonymity
- Certified Encryption Revisited
- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
- Anonymity from Public Key Encryption to Undeniable Signatures
- Key Agreement Protocols
- Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
- Cryptographic Protocols
- Unifying Zero-Knowledge Proofs of Knowledge
- Co-sound Zero-Knowledge with Public Keys
- Another Look at Extended Private Information Retrieval Protocols
- Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions
- Efficient Implementations
- Exponent Recoding and Regular Exponentiation Algorithms
- Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware
- Fast Elliptic-Curve Cryptography on the Cell Broadband Engine
- On Modular Decomposition of Integers
- Implementation Attacks
- Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
- An Improved Fault Based Attack of the Advanced Encryption Standard.