Skip to main content
  • Conference proceedings
  • © 2012

Progress in Cryptology -- AFRICACRYPT 2012

5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings

  • Fast track conference proceedings
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7374)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): AFRICACRYPT: International Conference on Cryptology in Africa

Conference proceedings info: AFRICACRYPT 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Signature Schemes

    1. Batch Verification of ECDSA Signatures

      • Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer
      Pages 1-18
    2. Extended Security Arguments for Signature Schemes

      • Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel
      Pages 19-34
    3. Sanitizable Signatures with Several Signers and Sanitizers

      • Sébastien Canard, Amandine Jambert, Roch Lescuyer
      Pages 35-52
  3. Stream Ciphers

    1. Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator

      • Jingjing Wang, Xiangxue Li, Kefei Chen, Wenzheng Zhang
      Pages 53-66
  4. Applications of Information Theory

    1. Fuzzy Vault for Multiple Users

      • Julien Bringer, Hervé Chabanne, Mélanie Favre
      Pages 67-81
    2. Improving the Performance of the SYND Stream Cipher

      • Mohammed Meziani, Gerhard Hoffmann, Pierre-Louis Cayrel
      Pages 99-116
  5. Block Ciphers

    1. Three-Subset Meet-in-the-Middle Attack on Reduced XTEA

      • Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta
      Pages 138-154
    2. Differential Cryptanalysis of Reduced-Round ICEBERG

      • Yue Sun, Meiqin Wang, Shujia Jiang, Qiumei Sun
      Pages 155-171
    3. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

      • Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof et al.
      Pages 172-187
  6. Network Security Protocols

    1. A Complementary Analysis of the (s)YZ and DIKE Protocols

      • Augustin P. Sarr, Philippe Elbaz–Vincent
      Pages 203-220
  7. Public-Key Cryptography

    1. A New Attack on RSA and CRT-RSA

      • Abderrahmane Nitaj
      Pages 221-233
    2. Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption

      • Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter
      Pages 234-251
  8. Cryptanalysis of Hash Functions

    1. The Collision Security of MDC-4

      • Ewan Fleischmann, Christian Forler, Stefan Lucks
      Pages 252-269
    2. SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks

      • Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann et al.
      Pages 270-286
    3. Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein

      • Elena Andreeva, Bart Mennink, Bart Preneel, Marjan Škrobot
      Pages 287-305
  9. Hash Functions: Design and Implementation

    1. The GLUON Family: A Lightweight Hash Function Family Based on FCSRs

      • Thierry P. Berger, Joffrey D’Hayer, Kevin Marquet, Marine Minier, Gaël Thomas
      Pages 306-323

Other Volumes

  1. Progress in Cryptology - AFRICACRYPT 2012

About this book

This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.

Editors and Affiliations

  • Ecole Polytechnice Fédérale de Lausanne, IC - LASEC, Lausanne, Switzerland

    Aikaterini Mitrokotsa, Serge Vaudenay

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access