Yu Sasaki, Lei Wang, Yasuhide Sakai, K. Sakiyama, K. Ohta
{"title":"Three-Subset Meet-in-the-Middle Attack on Reduced XTEA","authors":"Yu Sasaki, Lei Wang, Yasuhide Sakai, K. Sakiyama, K. Ohta","doi":"10.1007/978-3-642-31410-0_9","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_9","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128034806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sanitizable Signatures with Several Signers and Sanitizers","authors":"Sébastien Canard, Amandine Jambert, Roch Lescuyer","doi":"10.1007/978-3-642-31410-0_3","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_3","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121123319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stream Ciphers, a Perspective","authors":"W. Meier","doi":"10.1007/978-3-642-31410-0_25","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_25","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125086153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Eisenbarth, Zheng Gong, T. Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, F. Koeune, T. Nad, Thomas Plos, F. Regazzoni, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel
{"title":"Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices","authors":"T. Eisenbarth, Zheng Gong, T. Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, F. Koeune, T. Nad, Thomas Plos, F. Regazzoni, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel","doi":"10.1007/978-3-642-31410-0_11","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_11","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized Adversary","authors":"R. Safavi-Naini, M. Tuhin","doi":"10.1007/978-3-642-31410-0_6","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_6","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123556235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Andreeva, Bart Mennink, B. Preneel, Marjan Skrobot
{"title":"Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein","authors":"E. Andreeva, Bart Mennink, B. Preneel, Marjan Skrobot","doi":"10.1007/978-3-642-31410-0_18","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_18","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125492786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform","authors":"Damien Vergnaud","doi":"10.1007/978-3-642-21969-6_3","DOIUrl":"https://doi.org/10.1007/978-3-642-21969-6_3","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Multiplication in Finite Field Extensions of Degree 5","authors":"Nadia El Mrabet, Aurore Guillevic, S. Ionica","doi":"10.1007/978-3-642-21969-6_12","DOIUrl":"https://doi.org/10.1007/978-3-642-21969-6_12","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128880994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Really Fast Syndrome-Based Hashing","authors":"D. Bernstein, T. Lange, C. Peters, P. Schwabe","doi":"10.1007/978-3-642-21969-6_9","DOIUrl":"https://doi.org/10.1007/978-3-642-21969-6_9","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116292004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}