{"title":"Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security","authors":"M. Yehia, R. Altawy, T. Gulliver","doi":"10.1007/978-3-030-51938-4_12","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_12","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129071789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Template Attack on ECDSA:","authors":"Niels Roelofs, Niels Samwel, L. Batina, J. Daemen","doi":"10.1007/978-3-030-51938-4_16","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_16","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115660349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression","authors":"Meenakshi Kansal, Ratna Dutta","doi":"10.1007/978-3-030-51938-4_14","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_14","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123689696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of FlexAEAD","authors":"Mostafizar Rahman, Dhiman Saha, G. Paul","doi":"10.1007/978-3-030-51938-4_8","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_8","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127524751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MixColumns Coefficient Property and Security of the AES with A Secret S-Box","authors":"X. An, Kai Hu, Meiqin Wang","doi":"10.1007/978-3-030-51938-4_6","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_6","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129958881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder","authors":"A. Hutchinson, Koray Karabina","doi":"10.1007/978-3-030-51938-4_20","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_20","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129548064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed F. Tolba, Muhammad H. ElSheikh, A. Youssef
{"title":"Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE","authors":"Mohamed F. Tolba, Muhammad H. ElSheikh, A. Youssef","doi":"10.1007/978-3-030-51938-4_5","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_5","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127531302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fabio Campos, Tim Kohlstadt, S. Reith, Marc Stöttinger
{"title":"LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4","authors":"Fabio Campos, Tim Kohlstadt, S. Reith, Marc Stöttinger","doi":"10.1007/978-3-030-51938-4_13","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_13","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133132996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UC Updatable Databases and Applications","authors":"Aditya Damodaran, A. Rial","doi":"10.1007/978-3-030-51938-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-51938-4_4","url":null,"abstract":"","PeriodicalId":232962,"journal":{"name":"Progress in Cryptology - AFRICACRYPT 2020","volume":"12174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128985301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}