Progress in Cryptology – AFRICACRYPT 2010 Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings /

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Bernstein, Daniel J. (Editor), Lange, Tanja (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Series:Lecture Notes in Computer Science, 6055
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Signatures
  • A New RSA-Based Signature Scheme
  • Fair Blind Signatures without Random Oracles
  • Fair Partially Blind Signatures
  • Attacks
  • Parallel Shortest Lattice Vector Enumeration on Graphics Cards
  • Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over
  • Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits
  • Protocols
  • Proofs of Restricted Shuffles
  • Batch Range Proof for Practical Small Ranges
  • Optimistic Fair Priced Oblivious Transfer
  • Networks
  • Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
  • Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes
  • Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
  • Elliptic Curves
  • Avoiding Full Extension Field Arithmetic in Pairing Computations
  • ECC2K-130 on Cell CPUs
  • Side-Channel Attacks and Fault Attacks
  • Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
  • Differential Fault Analysis of HC-128
  • Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
  • Public-Key Encryption
  • Strong Cryptography from Weak Secrets
  • Efficient Unidirectional Proxy Re-Encryption
  • Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
  • Keys and PUFs
  • Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
  • Quantum Readout of Physical Unclonable Functions
  • Ciphers and Hash Functions
  • Parallelizing the Camellia and SMS4 Block Ciphers
  • Improved Linear Differential Attacks on CubeHash
  • Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.