International Conference on Cryptology in Africa最新文献

筛选
英文 中文
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA 减少XTEA的三子集中间相遇攻击
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_9
Yu Sasaki, Lei Wang, Yasuhide Sakai, K. Sakiyama, K. Ohta
{"title":"Three-Subset Meet-in-the-Middle Attack on Reduced XTEA","authors":"Yu Sasaki, Lei Wang, Yasuhide Sakai, K. Sakiyama, K. Ohta","doi":"10.1007/978-3-642-31410-0_9","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_9","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128034806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Sanitizable Signatures with Several Signers and Sanitizers 具有多个签名者和杀毒程序的可杀毒签名
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_3
Sébastien Canard, Amandine Jambert, Roch Lescuyer
{"title":"Sanitizable Signatures with Several Signers and Sanitizers","authors":"Sébastien Canard, Amandine Jambert, Roch Lescuyer","doi":"10.1007/978-3-642-31410-0_3","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_3","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121123319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Stream Ciphers, a Perspective 流密码,透视
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_25
W. Meier
{"title":"Stream Ciphers, a Perspective","authors":"W. Meier","doi":"10.1007/978-3-642-31410-0_25","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_25","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125086153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices 分组密码在通信设备中的紧凑实现与性能评价
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_11
T. Eisenbarth, Zheng Gong, T. Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, F. Koeune, T. Nad, Thomas Plos, F. Regazzoni, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel
{"title":"Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices","authors":"T. Eisenbarth, Zheng Gong, T. Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, F. Koeune, T. Nad, Thomas Plos, F. Regazzoni, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel","doi":"10.1007/978-3-642-31410-0_11","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_11","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized Adversary 针对广义对手的1-Round (0, δ)-安全消息传输的边界和构造
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_6
R. Safavi-Naini, M. Tuhin
{"title":"Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized Adversary","authors":"R. Safavi-Naini, M. Tuhin","doi":"10.1007/978-3-642-31410-0_6","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_6","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123556235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein SHA-3入围者的安全性分析与比较BLAKE, Grøstl, JH, Keccak, Skein
International Conference on Cryptology in Africa Pub Date : 2012-07-10 DOI: 10.1007/978-3-642-31410-0_18
E. Andreeva, Bart Mennink, B. Preneel, Marjan Skrobot
{"title":"Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein","authors":"E. Andreeva, Bart Mennink, B. Preneel, Marjan Skrobot","doi":"10.1007/978-3-642-31410-0_18","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_18","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125492786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform 基于快速傅里叶变换的高效安全的广义模式匹配
International Conference on Cryptology in Africa Pub Date : 2011-07-05 DOI: 10.1007/978-3-642-21969-6_3
Damien Vergnaud
{"title":"Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform","authors":"Damien Vergnaud","doi":"10.1007/978-3-642-21969-6_3","DOIUrl":"https://doi.org/10.1007/978-3-642-21969-6_3","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Efficient Multiplication in Finite Field Extensions of Degree 5 5次有限域扩展中的有效乘法
International Conference on Cryptology in Africa Pub Date : 2011-07-05 DOI: 10.1007/978-3-642-21969-6_12
Nadia El Mrabet, Aurore Guillevic, S. Ionica
{"title":"Efficient Multiplication in Finite Field Extensions of Degree 5","authors":"Nadia El Mrabet, Aurore Guillevic, S. Ionica","doi":"10.1007/978-3-642-21969-6_12","DOIUrl":"https://doi.org/10.1007/978-3-642-21969-6_12","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128880994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficient Zero-Knowledge Proofs 高效的零知识证明
International Conference on Cryptology in Africa Pub Date : 2011-07-05 DOI: 10.1007/978-3-642-21969-6_24
Jens Groth
{"title":"Efficient Zero-Knowledge Proofs","authors":"Jens Groth","doi":"10.1007/978-3-642-21969-6_24","DOIUrl":"https://doi.org/10.1007/978-3-642-21969-6_24","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121462377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Really Fast Syndrome-Based Hashing 非常快速的基于综合症的哈希
International Conference on Cryptology in Africa Pub Date : 2011-07-05 DOI: 10.1007/978-3-642-21969-6_9
D. Bernstein, T. Lange, C. Peters, P. Schwabe
{"title":"Really Fast Syndrome-Based Hashing","authors":"D. Bernstein, T. Lange, C. Peters, P. Schwabe","doi":"10.1007/978-3-642-21969-6_9","DOIUrl":"https://doi.org/10.1007/978-3-642-21969-6_9","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116292004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信