{"title":"Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator","authors":"Jingjing Wang, Xiangxue Li, Kefei Chen, Wen-zheng Zhang","doi":"10.1007/978-3-642-31410-0_4","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_4","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125275683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the Performance of the SYND Stream Cipher","authors":"M. Meziani, Gerhard Hoffmann, Pierre-Louis Cayrel","doi":"10.1007/978-3-642-31410-0_7","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_7","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127572767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. D’Arco, María Isabel González Vasco, Á. L. P. D. Pozo, Claudio Soriente
{"title":"Size-Hiding in Private Set Intersection: Existential Results and Constructions","authors":"P. D’Arco, María Isabel González Vasco, Á. L. P. D. Pozo, Claudio Soriente","doi":"10.1007/978-3-642-31410-0_23","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_23","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"60 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Frederik Armknecht, S. Katzenbeisser, Andreas Peter
{"title":"Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption","authors":"Frederik Armknecht, S. Katzenbeisser, Andreas Peter","doi":"10.1007/978-3-642-31410-0_15","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_15","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129839607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Vault for Multiple Users","authors":"J. Bringer, H. Chabanne, M. Favre","doi":"10.1007/978-3-642-31410-0_5","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_5","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important","authors":"Enrico Thomae, Christopher Wolf","doi":"10.1007/978-3-642-31410-0_12","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_12","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125927077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Collision Security of MDC-4","authors":"E. Fleischmann, C. Forler, S. Lucks","doi":"10.1007/978-3-642-31410-0_16","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_16","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114554816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Black-Box Reductions and Separations in Cryptography","authors":"M. Fischlin","doi":"10.1007/978-3-642-31410-0_26","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_26","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"125 25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Complementary Analysis of the (s)YZ and DIKE Protocols","authors":"Augustin P. Sarr, P. Elbaz-Vincent","doi":"10.1007/978-3-642-31410-0_13","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_13","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"2685 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127486000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}