{"title":"A Tale of Three Signatures: Practical Attack of ECDSA with wNAF","authors":"Gabrielle De Micheli, Rémi Piau, Cécile Pierrot","doi":"10.1007/978-3-030-51938-4_18","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_18","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114208777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols
{"title":"Signatures of Knowledge for Boolean Circuits Under Standard Assumptions","authors":"Karim Baghery, Alonso González, Zaira Pindado, Carla Ràfols","doi":"10.1007/978-3-030-51938-4_2","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_2","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121708132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrea Basso, Péter Kutas, Simon-Philipp Merz, C. Petit, Charlotte Weitkämper
{"title":"On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol","authors":"Andrea Basso, Péter Kutas, Simon-Philipp Merz, C. Petit, Charlotte Weitkämper","doi":"10.1007/978-3-030-51938-4_10","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_10","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124993939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BBB Secure Nonce Based MAC Using Public Permutations","authors":"Avijit Dutta, M. Nandi","doi":"10.1007/978-3-030-51938-4_9","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_9","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115584566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A SAT-Based Approach for Index Calculus on Binary Elliptic Curves","authors":"Monika Trimoska, S. Ionica, Gilles Dequen","doi":"10.1007/978-3-030-51938-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_11","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121622677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When Similarities Among Devices are Taken for Granted: Another Look at Portability","authors":"Unai Rioja, L. Batina, I. Armendariz","doi":"10.1007/978-3-030-51938-4_17","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_17","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QA-NIZK Arguments of Same Opening for Bilateral Commitments","authors":"Carla Ràfols, Javier Silva","doi":"10.1007/978-3-030-51938-4_1","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_1","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114209264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}