Progress in cryptology - AFRICACRYPT...
International Conference on Cryptology in Africa (2019 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Progress in cryptology - AFRICACRYPT 2019 = 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Progress in cryptology - AFRICACRYPT 2019/ edited by Johannes Buchmann, Abderrahmane Nitaj, Tajjeeddine Rachidi.
    Reminder of title: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019 : proceedings /
    remainder title: AFRICACRYPT 2019
    other author: Buchmann, Johannes.
    corporate name: International Conference on Cryptology in Africa
    Published: Cham :Springer International Publishing : : 2019.,
    Description: xvi, 449 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Protocols -- Tiny WireGuard Tweak -- Extended 3-Party ACCE and Application to LoRaWAN 1.1 -- Post-Quantum Cryptography -- The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem -- Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies -- An IND-CCA-Secure Code-Based Encryption Scheme Using Rank Metric -- Zero-Knowledge -- UC-Secure CRS Generation for SNARKs -- On the Efficiency of Privacy-Preserving Smart Contract Systems -- Lattice Based Cryptography -- Ring Signatures based on Middle-Product Learning with Errors Problems -- Sampling the Integers with Low Relative Error -- A Refined Analysis of the Cost for Solving LWE via uSVP -- New Schemes and Analysis -- Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4 -- Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher -- An Improvement of Correlation Analysis for Vectorial Boolean Functions -- Block Ciphers -- On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T -- Practical Attacks on Reduced-Round AES -- Six Shades of AES -- Side-Channel Attacks and Countermeasures -- Revisiting Location Privacy from a Side-Channel Analysis Viewpoint -- Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures -- Analysis of Two Countermeasures against the Signal Leakage Attack -- Signatures -- Handling Vinegar Variables to Shorten Rainbow Key Pairs -- Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups -- A New Approach to Modelling Centralised Reputation Systems.
    Contained By: Springer eBooks
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-23696-0
    ISBN: 9783030236960
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login