C. A. Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, P. Gaborit
{"title":"Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting","authors":"C. A. Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, P. Gaborit","doi":"10.1007/978-3-642-38553-7_1","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_1","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127201090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Attack on RSA Using LSBs of Multiples of the Prime Factors","authors":"Abderrahmane Nitaj","doi":"10.1007/978-3-642-38553-7_17","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_17","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130442696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority","authors":"Isheeta Nargis, Payman Mohassel, W. Eberly","doi":"10.1007/978-3-642-38553-7_15","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_15","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123003157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs","authors":"A. Khalid, G. Paul, A. Chattopadhyay","doi":"10.1007/978-3-642-38553-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_11","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Triple-Base Number System for Scalar Multiplication","authors":"Wei Yu, Kunpeng Wang, Bao Li, Song Tian","doi":"10.1007/978-3-642-38553-7_26","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_26","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers","authors":"F. V. D. Broek, E. Poll","doi":"10.1007/978-3-642-38553-7_24","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_24","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116374168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sieving for Shortest Vectors in Ideal Lattices","authors":"Michael Schneider","doi":"10.1007/978-3-642-38553-7_22","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_22","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117192072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems","authors":"Alexandre Duc, S. Vaudenay","doi":"10.1007/978-3-642-38553-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_6","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Homomorphic Encryption with Access Policies: Characterization and New Constructions","authors":"Michael Clear, Arthur P. Hughes, H. Tewari","doi":"10.1007/978-3-642-38553-7_4","DOIUrl":"https://doi.org/10.1007/978-3-642-38553-7_4","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Attack on RSA and CRT-RSA","authors":"Abderrahmane Nitaj","doi":"10.1007/978-3-642-31410-0_14","DOIUrl":"https://doi.org/10.1007/978-3-642-31410-0_14","url":null,"abstract":"","PeriodicalId":134826,"journal":{"name":"International Conference on Cryptology in Africa","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121260852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}