International Conference on Cryptology in Africa最新文献

筛选
英文 中文
Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies 兼容超奇异同生的简单无关传输协议
International Conference on Cryptology in Africa Pub Date : 2019-07-09 DOI: 10.1007/978-3-030-23696-0_4
Vanessa Vitse
{"title":"Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies","authors":"Vanessa Vitse","doi":"10.1007/978-3-030-23696-0_4","DOIUrl":"https://doi.org/10.1007/978-3-030-23696-0_4","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131937311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Six Shades of AES AES的六种色调
International Conference on Cryptology in Africa Pub Date : 2019-07-09 DOI: 10.1007/978-3-030-23696-0_16
Fatih Balli, S. Banik
{"title":"Six Shades of AES","authors":"Fatih Balli, S. Banik","doi":"10.1007/978-3-030-23696-0_16","DOIUrl":"https://doi.org/10.1007/978-3-030-23696-0_16","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116065340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extended 3-Party textACCE and Application to LoRaWAN 1.1 LoRaWAN 1.1中扩展的三方文本及其应用
International Conference on Cryptology in Africa Pub Date : 2019-07-09 DOI: 10.1007/978-3-030-23696-0_2
Sébastien Canard, Loïc Ferreira
{"title":"Extended 3-Party textACCE and Application to LoRaWAN 1.1","authors":"Sébastien Canard, Loïc Ferreira","doi":"10.1007/978-3-030-23696-0_2","DOIUrl":"https://doi.org/10.1007/978-3-030-23696-0_2","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116116706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Two Countermeasures Against the Signal Leakage Attack 针对信号泄漏攻击的两种对策分析
International Conference on Cryptology in Africa Pub Date : 2019-07-09 DOI: 10.1007/978-3-030-23696-0_19
Ke Wang, Haodong Jiang
{"title":"Analysis of Two Countermeasures Against the Signal Leakage Attack","authors":"Ke Wang, Haodong Jiang","doi":"10.1007/978-3-030-23696-0_19","DOIUrl":"https://doi.org/10.1007/978-3-030-23696-0_19","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122575860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures SPARX-64/128的侧信道分析:密码分析和对策
International Conference on Cryptology in Africa Pub Date : 2019-07-09 DOI: 10.1007/978-3-030-23696-0_18
S. Ramesh, Hoda AlKhzaimi
{"title":"Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures","authors":"S. Ramesh, Hoda AlKhzaimi","doi":"10.1007/978-3-030-23696-0_18","DOIUrl":"https://doi.org/10.1007/978-3-030-23696-0_18","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122670126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Handling Vinegar Variables to Shorten Rainbow Key Pairs 处理醋变量缩短彩虹密钥对
International Conference on Cryptology in Africa Pub Date : 2019-07-09 DOI: 10.1007/978-3-030-23696-0_20
Gustavo Zambonin, Matheus S. P. Bittencourt, Ricardo Felipe Custódio
{"title":"Handling Vinegar Variables to Shorten Rainbow Key Pairs","authors":"Gustavo Zambonin, Matheus S. P. Bittencourt, Ricardo Felipe Custódio","doi":"10.1007/978-3-030-23696-0_20","DOIUrl":"https://doi.org/10.1007/978-3-030-23696-0_20","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121440089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improvement of Correlation Analysis for Vectorial Boolean Functions 向量布尔函数相关分析的改进
International Conference on Cryptology in Africa Pub Date : 2019-07-09 DOI: 10.1007/978-3-030-23696-0_13
Youssef Harmouch, R. Kouch, H. Ben-Azza
{"title":"An Improvement of Correlation Analysis for Vectorial Boolean Functions","authors":"Youssef Harmouch, R. Kouch, H. Ben-Azza","doi":"10.1007/978-3-030-23696-0_13","DOIUrl":"https://doi.org/10.1007/978-3-030-23696-0_13","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127521543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ring Signatures Based on Middle-Product Learning with Errors Problems 带有错误问题的中间产品学习环签名
International Conference on Cryptology in Africa Pub Date : 2019-07-09 DOI: 10.1007/978-3-030-23696-0_8
Dipayan Das, M. Au, Zhenfei Zhang
{"title":"Ring Signatures Based on Middle-Product Learning with Errors Problems","authors":"Dipayan Das, M. Au, Zhenfei Zhang","doi":"10.1007/978-3-030-23696-0_8","DOIUrl":"https://doi.org/10.1007/978-3-030-23696-0_8","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129941309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reducing the Cost of Authenticity with Leakages: a mathsf CIML2 -Secure mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher 降低具有泄漏的真实性成本:一个mathsf CIML2 -Secure mathsf AE方案与一个强保护可调块密码的调用
International Conference on Cryptology in Africa Pub Date : 2019-07-09 DOI: 10.1007/978-3-030-23696-0_12
Francesco Berti, Olivier Pereira, François-Xavier Standaert
{"title":"Reducing the Cost of Authenticity with Leakages: a mathsf CIML2 -Secure mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher","authors":"Francesco Berti, Olivier Pereira, François-Xavier Standaert","doi":"10.1007/978-3-030-23696-0_12","DOIUrl":"https://doi.org/10.1007/978-3-030-23696-0_12","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124139461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Practical Attacks on Reduced-Round AES 对缩减轮数AES的实际攻击
International Conference on Cryptology in Africa Pub Date : 2019-07-09 DOI: 10.1007/978-3-030-23696-0_15
N. Bardeh, Sondre Rønjom
{"title":"Practical Attacks on Reduced-Round AES","authors":"N. Bardeh, Sondre Rønjom","doi":"10.1007/978-3-030-23696-0_15","DOIUrl":"https://doi.org/10.1007/978-3-030-23696-0_15","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116971013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信