International Conference on Cryptology in Africa最新文献

筛选
英文 中文
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications 具有双长期活动门的变色龙哈希及其应用
International Conference on Cryptology in Africa Pub Date : 2018-05-07 DOI: 10.1007/978-3-319-89339-6_2
S. Krenn, H. C. Pöhls, Kai Samelin, Daniel Slamanig
{"title":"Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications","authors":"S. Krenn, H. C. Pöhls, Kai Samelin, Daniel Slamanig","doi":"10.1007/978-3-319-89339-6_2","DOIUrl":"https://doi.org/10.1007/978-3-319-89339-6_2","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115970771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Unified Formulas for Some Deterministic Almost-Injective Encodings into Hyperelliptic Curves 超椭圆曲线中若干确定性近内射编码的统一公式
International Conference on Cryptology in Africa Pub Date : 2018-05-07 DOI: 10.1007/978-3-319-89339-6_11
Michel Seck, Nafissatou Diarra
{"title":"Unified Formulas for Some Deterministic Almost-Injective Encodings into Hyperelliptic Curves","authors":"Michel Seck, Nafissatou Diarra","doi":"10.1007/978-3-319-89339-6_11","DOIUrl":"https://doi.org/10.1007/978-3-319-89339-6_11","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131341789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge 双版本DeepBKZ的开发及其在解决LWE挑战中的应用
International Conference on Cryptology in Africa Pub Date : 2018-05-07 DOI: 10.1007/978-3-319-89339-6_10
Masaya Yasuda, Junpei Yamaguchi, Michiko Ooka, Satoshi Nakamura
{"title":"Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge","authors":"Masaya Yasuda, Junpei Yamaguchi, Michiko Ooka, Satoshi Nakamura","doi":"10.1007/978-3-319-89339-6_10","DOIUrl":"https://doi.org/10.1007/978-3-319-89339-6_10","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121763547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Practical Fault Injection on Deterministic Signatures: The Case of EdDSA 确定性特征的实际故障注入:以EdDSA为例
International Conference on Cryptology in Africa Pub Date : 2018-05-07 DOI: 10.1007/978-3-319-89339-6_17
Niels Samwel, L. Batina
{"title":"Practical Fault Injection on Deterministic Signatures: The Case of EdDSA","authors":"Niels Samwel, L. Batina","doi":"10.1007/978-3-319-89339-6_17","DOIUrl":"https://doi.org/10.1007/978-3-319-89339-6_17","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127771461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Complete Characterization of Plateaued Boolean Functions in Terms of Their Cayley Graphs 高原布尔函数在其Cayley图上的完全表征
International Conference on Cryptology in Africa Pub Date : 2018-05-07 DOI: 10.1007/978-3-319-89339-6_1
Constanza Riera, P. Solé, P. Stănică
{"title":"A Complete Characterization of Plateaued Boolean Functions in Terms of Their Cayley Graphs","authors":"Constanza Riera, P. Solé, P. Stănică","doi":"10.1007/978-3-319-89339-6_1","DOIUrl":"https://doi.org/10.1007/978-3-319-89339-6_1","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC 改进了对Deoxys-BC的回旋镖攻击
International Conference on Cryptology in Africa Pub Date : 2018-05-07 DOI: 10.1007/978-3-319-89339-6_6
Yu Sasaki
{"title":"Improved Related-Tweakey Boomerang Attacks on Deoxys-BC","authors":"Yu Sasaki","doi":"10.1007/978-3-319-89339-6_6","DOIUrl":"https://doi.org/10.1007/978-3-319-89339-6_6","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cryptanalysis of RSA Variants with Modified Euler Quotient 具有修正欧拉商的RSA变体的密码分析
International Conference on Cryptology in Africa Pub Date : 2018-05-07 DOI: 10.1007/978-3-319-89339-6_15
Mengce Zheng, N. Kunihiro, Honggang Hu
{"title":"Cryptanalysis of RSA Variants with Modified Euler Quotient","authors":"Mengce Zheng, N. Kunihiro, Honggang Hu","doi":"10.1007/978-3-319-89339-6_15","DOIUrl":"https://doi.org/10.1007/978-3-319-89339-6_15","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121584625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SCA-Resistance for AES: How Cheap Can We Go? AES的sca电阻:我们能走多便宜?
International Conference on Cryptology in Africa Pub Date : 2018-05-07 DOI: 10.1007/978-3-319-89339-6_7
R. Chaves, L. Chmielewski, F. Regazzoni, L. Batina
{"title":"SCA-Resistance for AES: How Cheap Can We Go?","authors":"R. Chaves, L. Chmielewski, F. Regazzoni, L. Batina","doi":"10.1007/978-3-319-89339-6_7","DOIUrl":"https://doi.org/10.1007/978-3-319-89339-6_7","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124481398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks 爬下层次结构:机器学习侧信道攻击的层次分类
International Conference on Cryptology in Africa Pub Date : 2017-05-24 DOI: 10.1007/978-3-319-57339-7_4
S. Picek, Annelie Heuser, A. Jović, Axel Legay
{"title":"Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks","authors":"S. Picek, Annelie Heuser, A. Jović, Axel Legay","doi":"10.1007/978-3-319-57339-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-57339-7_4","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116282775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
RingRainbow - An Efficient Multivariate Ring Signature Scheme RingRainbow -一个高效的多元环签名方案
International Conference on Cryptology in Africa Pub Date : 2017-05-24 DOI: 10.1007/978-3-319-57339-7_1
M. S. Mohamed, Albrecht Petzoldt
{"title":"RingRainbow - An Efficient Multivariate Ring Signature Scheme","authors":"M. S. Mohamed, Albrecht Petzoldt","doi":"10.1007/978-3-319-57339-7_1","DOIUrl":"https://doi.org/10.1007/978-3-319-57339-7_1","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128660781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信