Overview
- Includes supplementary material: sn.pub/extras
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10239)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: AFRICACRYPT 2017.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (13 papers)
-
Side-Channel Analysis
-
Differential Cryptanalysis
Other volumes
-
Progress in Cryptology - AFRICACRYPT 2017
Keywords
- cryptography
- side-channel attacks
- elliptic curve-based cryptography
- hash functions
- cryptanalysis
- ring signatures
- machine learning techniques
- formal security analysis
- security protocols
- key management
- hardware attacks and countermeasures
- symmetric cryptography
- impossible differential
- information-theoretic techniques
- mathematical foundations of cryptography
- hardware attacks and countermeasures
- lossy encryption
- symmetric groups
- oblivious transfer
- query processing
About this book
The 13 papers presented in this book were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptographic schemes, side-channel analysis, differential cryptanalysis, applications, and number theory.
Editors and Affiliations
Bibliographic Information
Book Title: Progress in Cryptology - AFRICACRYPT 2017
Book Subtitle: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings
Editors: Marc Joye, Abderrahmane Nitaj
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-57339-7
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG 2017
Softcover ISBN: 978-3-319-57338-0Published: 20 April 2017
eBook ISBN: 978-3-319-57339-7Published: 10 May 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 231
Number of Illustrations: 42 b/w illustrations
Topics: Systems and Data Security, Cryptology, Coding and Information Theory, Numeric Computing, Computation by Abstract Devices, Management of Computing and Information Systems