This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011.
The 23 papers presented together with abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. They are organized in topical sections on protocols, cryptanalysis, secret-key cryptography, efficient implementations, cryptographic schemes, algorithmic problems, elliptic curves, fault analysis, and security proofs.
Author(s): Jake Loftus, Nigel P. Smart (auth.), Abderrahmane Nitaj, David Pointcheval (eds.)
Series: Lecture Notes in Computer Science 6737
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2011
Language: English
Pages: 387
Tags: Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Systems and Data Security; Operating Systems
Front Matter....Pages -
Secure Outsourced Computation....Pages 1-20
Fully Simulatable Quantum-Secure Coin-Flipping and Applications....Pages 21-40
Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform....Pages 41-58
Identification Schemes from Key Encapsulation Mechanisms....Pages 59-76
Attacking Bivium and Trivium with the Characteristic Set Method....Pages 77-91
Improved Cryptanalysis of the Multi-Prime φ - Hiding Assumption....Pages 92-99
FPGA Implementation of a Statistical Saturation Attack against PRESENT....Pages 100-116
Collisions of MMO-MD5 and Their Impact on Original MD5....Pages 117-133
Really Fast Syndrome-Based Hashing....Pages 134-152
Montgomery’s Trick and Fast Implementation of Masked AES....Pages 153-169
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co- Z Coordinate Representation....Pages 170-187
Efficient Multiplication in Finite Field Extensions of Degree 5....Pages 188-205
Achieving Optimal Anonymity in Transferable E-Cash with a Judge....Pages 206-223
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model....Pages 224-241
Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design....Pages 242-259
Analyzing Standards for RSA Integers....Pages 260-277
Hashing into Hessian Curves....Pages 278-289
On Randomness Extraction in Elliptic Curves....Pages 290-297
Fault Analysis of Grain-128 by Targeting NFSR....Pages 298-315
Differential Fault Analysis of Sosemanuk ....Pages 316-331
An Improved Differential Fault Analysis on AES-256....Pages 332-347
Benaloh’s Dense Probabilistic Encryption Revisited....Pages 348-362
On the Security of the Winternitz One-Time Signature Scheme....Pages 363-378
Efficient Zero-Knowledge Proofs....Pages 379-379
Some Key Techniques on Pairing Vector Spaces....Pages 380-382
The NIST SHA-3 Competition: A Perspective on the Final Year....Pages 383-386
Back Matter....Pages -