International Conference on Cryptology in Africa最新文献

筛选
英文 中文
A More Efficient AES Threshold Implementation 一个更有效的AES阈值实现
International Conference on Cryptology in Africa Pub Date : 2014-05-28 DOI: 10.1007/978-3-319-06734-6_17
Begül Bilgin, Benedikt Gierlichs, S. Nikova, V. Nikov, V. Rijmen
{"title":"A More Efficient AES Threshold Implementation","authors":"Begül Bilgin, Benedikt Gierlichs, S. Nikova, V. Nikov, V. Rijmen","doi":"10.1007/978-3-319-06734-6_17","DOIUrl":"https://doi.org/10.1007/978-3-319-06734-6_17","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124294750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
Breaking the IOC Authenticated Encryption Mode 破解IOC认证加密模式
International Conference on Cryptology in Africa Pub Date : 2014-05-28 DOI: 10.1007/978-3-319-06734-6_8
P. Bottinelli, Reza Reyhanitabar, S. Vaudenay
{"title":"Breaking the IOC Authenticated Encryption Mode","authors":"P. Bottinelli, Reza Reyhanitabar, S. Vaudenay","doi":"10.1007/978-3-319-06734-6_8","DOIUrl":"https://doi.org/10.1007/978-3-319-06734-6_8","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132575650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DRECON: DPA Resistant Encryption by Construction DRECON:构造抗DPA加密
International Conference on Cryptology in Africa Pub Date : 2014-05-28 DOI: 10.1007/978-3-319-06734-6_25
Suvadeep Hajra, C. Rebeiro, S. Bhasin, G. Bajaj, Sahil Sharma, S. Guilley, Debdeep Mukhopadhyay
{"title":"DRECON: DPA Resistant Encryption by Construction","authors":"Suvadeep Hajra, C. Rebeiro, S. Bhasin, G. Bajaj, Sahil Sharma, S. Guilley, Debdeep Mukhopadhyay","doi":"10.1007/978-3-319-06734-6_25","DOIUrl":"https://doi.org/10.1007/978-3-319-06734-6_25","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125326913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Minimizing S-Boxes in Hardware by Utilizing Linear Transformations 利用线性变换最小化硬件中的s盒
International Conference on Cryptology in Africa Pub Date : 2014-05-28 DOI: 10.1007/978-3-319-06734-6_15
Sebastian Kutzner, Phuong Ha Nguyen, A. Poschmann, Marc Stöttinger
{"title":"Minimizing S-Boxes in Hardware by Utilizing Linear Transformations","authors":"Sebastian Kutzner, Phuong Ha Nguyen, A. Poschmann, Marc Stöttinger","doi":"10.1007/978-3-319-06734-6_15","DOIUrl":"https://doi.org/10.1007/978-3-319-06734-6_15","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"4 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125673284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
New Results for Rank-Based Cryptography 基于秩的密码学的新结果
International Conference on Cryptology in Africa Pub Date : 2014-05-28 DOI: 10.1007/978-3-319-06734-6_1
P. Gaborit, O. Ruatta, Julien Schrek, G. Zémor
{"title":"New Results for Rank-Based Cryptography","authors":"P. Gaborit, O. Ruatta, Julien Schrek, G. Zémor","doi":"10.1007/978-3-319-06734-6_1","DOIUrl":"https://doi.org/10.1007/978-3-319-06734-6_1","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130663249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Proxy Re-Encryption Scheme Supporting a Selection of Delegatees 支持被委托选择的代理重加密方案
International Conference on Cryptology in Africa Pub Date : 2014-05-28 DOI: 10.1007/978-3-319-06734-6_2
Julien Devigne, Eleonora Guerrini, Fabien Laguillaumie
{"title":"Proxy Re-Encryption Scheme Supporting a Selection of Delegatees","authors":"Julien Devigne, Eleonora Guerrini, Fabien Laguillaumie","doi":"10.1007/978-3-319-06734-6_2","DOIUrl":"https://doi.org/10.1007/978-3-319-06734-6_2","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121448461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparison of the Homomorphic Encryption Schemes FV and YASHE 同态加密方案FV与YASHE的比较
International Conference on Cryptology in Africa Pub Date : 2014-05-28 DOI: 10.1007/978-3-319-06734-6_20
Tancrède Lepoint, M. Naehrig
{"title":"A Comparison of the Homomorphic Encryption Schemes FV and YASHE","authors":"Tancrède Lepoint, M. Naehrig","doi":"10.1007/978-3-319-06734-6_20","DOIUrl":"https://doi.org/10.1007/978-3-319-06734-6_20","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134573768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 199
Further Improvement of Factoring RSA Moduli with Implicit Hint 用隐式提示分解RSA模的进一步改进
International Conference on Cryptology in Africa Pub Date : 2014-05-28 DOI: 10.1007/978-3-319-06734-6_11
Liqiang Peng, L. Hu, Jun Xu, Zhangjie Huang, Yonghong Xie
{"title":"Further Improvement of Factoring RSA Moduli with Implicit Hint","authors":"Liqiang Peng, L. Hu, Jun Xu, Zhangjie Huang, Yonghong Xie","doi":"10.1007/978-3-319-06734-6_11","DOIUrl":"https://doi.org/10.1007/978-3-319-06734-6_11","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130866229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Preimage Attacks on Reduced-Round Stribog 缩圆Stribog的预像攻击
International Conference on Cryptology in Africa Pub Date : 2014-05-28 DOI: 10.1007/978-3-319-06734-6_7
R. Altawy, A. Youssef
{"title":"Preimage Attacks on Reduced-Round Stribog","authors":"R. Altawy, A. Youssef","doi":"10.1007/978-3-319-06734-6_7","DOIUrl":"https://doi.org/10.1007/978-3-319-06734-6_7","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers 8位AVR微控制器上Montgomery模乘法的新速度记录
International Conference on Cryptology in Africa Pub Date : 2014-05-28 DOI: 10.1007/978-3-319-06734-6_14
Zhe Liu, J. Großschädl
{"title":"New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers","authors":"Zhe Liu, J. Großschädl","doi":"10.1007/978-3-319-06734-6_14","DOIUrl":"https://doi.org/10.1007/978-3-319-06734-6_14","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126743884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信