M. Bardet, V. Dragoi, Jean-Gabriel Luque, A. Otmani
{"title":"Weak Keys for the Quasi-Cyclic MDPC Public Key Encryption Scheme","authors":"M. Bardet, V. Dragoi, Jean-Gabriel Luque, A. Otmani","doi":"10.1007/978-3-319-31517-1_18","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_18","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131665927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication Key Recovery on Galois/Counter Mode (GCM)","authors":"J. Mattsson, M. Westerlund","doi":"10.1007/978-3-319-31517-1_7","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_7","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"80 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs","authors":"Michael Clear, C. McGoldrick","doi":"10.1007/978-3-319-31517-1_16","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_16","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114349481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Picek, Dominik Sisejkovic, D. Jakobović, L. Batina, Bohan Yang, Danilo Šijačić, N. Mentens
{"title":"Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware","authors":"S. Picek, Dominik Sisejkovic, D. Jakobović, L. Batina, Bohan Yang, Danilo Šijačić, N. Mentens","doi":"10.1007/978-3-319-31517-1_8","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_8","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132765450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order","authors":"Pratish Datta, Ratna Dutta, S. Mukhopadhyay","doi":"10.1007/978-3-319-31517-1_17","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_17","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117179586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software-Only Two-Factor Authentication Secure Against Active Servers","authors":"J. Bringer, H. Chabanne, Roch Lescuyer","doi":"10.1007/978-3-319-31517-1_15","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_15","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130015341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Security of the (F)HMQV Protocol","authors":"Augustin P. Sarr, P. Elbaz-Vincent","doi":"10.1007/978-3-319-31517-1_11","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_11","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123276608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Buchmann, Florian Göpfert, Rachel Player, T. Wunderer
{"title":"On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack","authors":"J. Buchmann, Florian Göpfert, Rachel Player, T. Wunderer","doi":"10.1007/978-3-319-31517-1_2","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_2","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126243897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming","authors":"S. D. Hoogh, Berry Schoenmakers, Meilof Veeningen","doi":"10.1007/978-3-319-31517-1_14","DOIUrl":"https://doi.org/10.1007/978-3-319-31517-1_14","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124195261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of Some Protocols Using Matrices over Group Rings","authors":"Mohammad Eftekhari","doi":"10.1007/978-3-319-57339-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-57339-7_13","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130104353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}