International Conference on Cryptology in Africa最新文献

筛选
英文 中文
On Indifferentiable Hashing into the Jacobian of Hyperelliptic Curves of Genus 2 关于2属超椭圆曲线雅可比矩阵的不可微哈希
International Conference on Cryptology in Africa Pub Date : 2017-05-24 DOI: 10.1007/978-3-319-57339-7_12
Michel Seck, Hortense Boudjou, Nafissatou Diarra, Ahmed Youssef Ould Cheikh Khlil
{"title":"On Indifferentiable Hashing into the Jacobian of Hyperelliptic Curves of Genus 2","authors":"Michel Seck, Hortense Boudjou, Nafissatou Diarra, Ahmed Youssef Ould Cheikh Khlil","doi":"10.1007/978-3-319-57339-7_12","DOIUrl":"https://doi.org/10.1007/978-3-319-57339-7_12","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption 有损阈值同态加密的高效遗忘传输
International Conference on Cryptology in Africa Pub Date : 2017-05-24 DOI: 10.1007/978-3-319-57339-7_10
Isheeta Nargis
{"title":"Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption","authors":"Isheeta Nargis","doi":"10.1007/978-3-319-57339-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-57339-7_10","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123508421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications 利用纳米级CMOS电路的静态功率进行密码应用的多变量分析
International Conference on Cryptology in Africa Pub Date : 2017-05-24 DOI: 10.1007/978-3-319-57339-7_5
Milena Djukanovic, Davide Bellizia, G. Scotti, A. Trifiletti
{"title":"Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications","authors":"Milena Djukanovic, Davide Bellizia, G. Scotti, A. Trifiletti","doi":"10.1007/978-3-319-57339-7_5","DOIUrl":"https://doi.org/10.1007/978-3-319-57339-7_5","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"8 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114009913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Impossible Differential Attack on Reduced Round SPARX-64/128 对缩小圆形SPARX-64/128的不可能差分攻击
International Conference on Cryptology in Africa Pub Date : 2017-05-24 DOI: 10.1007/978-3-319-57339-7_8
A. Abdelkhalek, Mohamed F. Tolba, A. Youssef
{"title":"Impossible Differential Attack on Reduced Round SPARX-64/128","authors":"A. Abdelkhalek, Mohamed F. Tolba, A. Youssef","doi":"10.1007/978-3-319-57339-7_8","DOIUrl":"https://doi.org/10.1007/978-3-319-57339-7_8","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131092554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Private Conjunctive Query over Encrypted Data 加密数据私有合取查询
International Conference on Cryptology in Africa Pub Date : 2017-05-24 DOI: 10.1007/978-3-319-57339-7_9
T. Saha, Takeshi Koshiba
{"title":"Private Conjunctive Query over Encrypted Data","authors":"T. Saha, Takeshi Koshiba","doi":"10.1007/978-3-319-57339-7_9","DOIUrl":"https://doi.org/10.1007/978-3-319-57339-7_9","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122871965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration 随机泄漏下带密钥枚举分组密码的差分偏置攻击
International Conference on Cryptology in Africa Pub Date : 2017-05-24 DOI: 10.1007/978-3-319-57339-7_6
Haruhisa Kosuge, Hidema Tanaka
{"title":"Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration","authors":"Haruhisa Kosuge, Hidema Tanaka","doi":"10.1007/978-3-319-57339-7_6","DOIUrl":"https://doi.org/10.1007/978-3-319-57339-7_6","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114243688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three Dimensional Montgomery Ladder, Differential Point Tripling on Montgomery Curves and Point Quintupling on Weierstrass' and Edwards Curves 三维Montgomery梯,Montgomery曲线上的微分点三倍和weerstrass曲线和Edwards曲线上的点五倍
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_5
S. Rao
{"title":"Three Dimensional Montgomery Ladder, Differential Point Tripling on Montgomery Curves and Point Quintupling on Weierstrass' and Edwards Curves","authors":"S. Rao","doi":"10.1007/978-3-319-31517-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_5","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121571463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates 基于Lambda坐标的椭圆曲线加密的快速紧凑FPGA实现
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_4
Burak Gövem, K. Järvinen, Kris Aerts, I. Verbauwhede, N. Mentens
{"title":"A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates","authors":"Burak Gövem, K. Järvinen, Kris Aerts, I. Verbauwhede, N. Mentens","doi":"10.1007/978-3-319-31517-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_4","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124320263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fast Oblivious AES A Dedicated Application of the MiniMac Protocol 快速遗忘AES是MiniMac协议的专用应用
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_13
I. Damgård, Rasmus Winther Zakarias
{"title":"Fast Oblivious AES A Dedicated Application of the MiniMac Protocol","authors":"I. Damgård, Rasmus Winther Zakarias","doi":"10.1007/978-3-319-31517-1_13","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_13","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125975270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Efficient (Ideal) Lattice Sieving Using Cross-Polytope LSH 交叉多面体LSH高效(理想)点阵筛分
International Conference on Cryptology in Africa Pub Date : 2016-04-13 DOI: 10.1007/978-3-319-31517-1_1
Anja Becker, Thijs Laarhoven
{"title":"Efficient (Ideal) Lattice Sieving Using Cross-Polytope LSH","authors":"Anja Becker, Thijs Laarhoven","doi":"10.1007/978-3-319-31517-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_1","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122282112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信