Skip to main content
  • Conference proceedings
  • © 2008

Progress in Cryptology - AFRICACRYPT 2008

First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5023)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): AFRICACRYPT: International Conference on Cryptology in Africa

Conference proceedings info: AFRICACRYPT 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. AES

    1. Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds

      • Samuel Galice, Marine Minier
      Pages 1-15
    2. Implementation of the AES-128 on Virtex-5 FPGAs

      • Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy
      Pages 16-26
  3. Analysis of RFID Protocols

    1. Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol

      • Paolo D’Arco, Alfredo De Santis
      Pages 27-39
  4. Invited Talk

    1. The Psychology of Security

      • Bruce Schneier
      Pages 50-79
  5. Cryptographic Protocols

    1. Robust Threshold Schemes Based on the Chinese Remainder Theorem

      • Kamer Kaya, Ali Aydın Selçuk
      Pages 94-108
    2. An Authentication Protocol with Encrypted Biometric Data

      • Julien Bringer, Hervé Chabanne
      Pages 109-124
  6. Authentication

    1. Cryptanalysis of the TRMS Signature Scheme of PKC’05

      • Luk Bettale, Jean-Charles Faugère, Ludovic Perret
      Pages 143-155
  7. Public-Key Cryptography

    1. An Adaptation of the NICE Cryptosystem to Real Quadratic Orders

      • Michael J. Jacobson Jr., Renate Scheidler, Daniel Weimer
      Pages 191-208
  8. Pseudorandomness

  9. Analysis of Stream Ciphers

    1. Yet Another Attack on Vest

      • Pascal Delaunay, Antoine Joux
      Pages 221-235
    2. Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers

      • Simon Fischer, Shahram Khazaei, Willi Meier
      Pages 236-245
    3. Correlated Keystreams in Moustique

      • Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matt Robshaw, Gautham Sekar
      Pages 246-257
    4. Analysis of Grain’s Initialization Algorithm

      • Christophe De Cannière, Özgül Küçük, Bart Preneel
      Pages 276-289

Other Volumes

  1. Progress in Cryptology – AFRICACRYPT 2008

About this book

This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008. The 25 revised full papers presented together with 2 invited papers were carefully selected during two rounds of reviewing and improvement from 82 submissions. The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access