+612 9045 4394
 
CHECKOUT
Progress in Cryptology--AFRICACRYPT 2010 : Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings - Daniel J. Bernstein

Progress in Cryptology--AFRICACRYPT 2010

Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings

By: Daniel J. Bernstein (Editor), Tanja Lange (Editor)

Paperback

Published: 14th April 2010
Ships: 5 to 9 business days
5 to 9 business days
$158.39
or 4 easy payments of $39.60 with Learn more

Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from the University of Cape Town, were always a pleasure to work with and did an outstanding job with the local arrangements. We are deeplythankfulthat theyagreedto hostAfricacrypt2010with onlyfour months notice after unanticipated events forced a change of location. The Africacrypt 2010 submission deadline was split into two. Authors s- mitting paperswererequiredto registertitles andabstractsby the ?rstdeadline, January 5. A total of 121 submissions had been received by this deadline, - though some were withdrawn before review. Authors were allowed to continue working on their papers until the second deadline, January 10. Submissions were evaluated in three phases over a period of nearly two months. The selection phase started on January 5: Program Committee m- bers began evaluating abstracts and volunteering to handle various papers. We assigned a team of people to each paper. The review phase started on January 11: Program Committee members were given access to the full papers and - gan in-depth reviews of 82 submissions. Most of the reviews were completed by February7,thebeginningofthediscussionphase.ProgramCommitteemembers were given access to other reviews and built consensus in their evaluations of the submissions. In the end the discussions included 285 full reports and 203 - ditional comments. The submissions, reviews, and subsequent discussions were handled smoothly by iChair.

Signatures
A New RSA-Based Signature Schemep. 1
Fair Blind Signatures without Random Oraclesp. 16
Fair Partially Blind Signaturesp. 34
Attacks
Parallel Shortest Lattice Vector Enumeration on Graphics Cardsp. 52
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2p. 69
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bitsp. 82
Protocols
Proofs of Restricted Shufflesp. 100
Batch Range Proof for Practical Small Rangesp. 114
Optimistic Fair Priced Oblivious Transferp. 131
Networks
Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codesp. 148
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemesp. 166
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resiliencep. 184
Elliptic Curves
Avoiding Full Extension Field Arithmetic in Pairing Computationsp. 203
ECC2K-130 on Cell CPUsp. 225
Side-Channel Attacks and Fault Attacks
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Acceleratorp. 243
Differential Fault Analysis of HC-128p. 261
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devicesp. 279
Public-Key Encryption
Strong Cryptography from Weak Secrets: Building Efficient PKE and IBE from Distributed Passwordsp. 297
Efficient Unidirectional Proxy Re-Encryptionp. 316
Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitionsp. 333
Keys and PUFs
Flexible Group Key Exchange with On-demand Computation of Subgroup Keysp. 351
Quantum Readout of Physical Unclonable Functions Boris ¿koricp. 369
Ciphers and Hash Functions
Parallelizing the Camellia and SMS4 Block Ciphersp. 387
Improved Linear Differential Attacks on CubeHashp. 407
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512p. 419
Author Indexp. 437
Table of Contents provided by Ingram. All Rights Reserved.

ISBN: 9783642126772
ISBN-10: 3642126774
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 436
Published: 14th April 2010
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.11 x 15.49  x 2.29
Weight (kg): 0.68