×

Progress in cryptology – AFRICACRYPT 2019. 11th international conference on cryptology in Africa, Rabat, Morocco, July 9–11, 2019. Proceedings. (English) Zbl 1428.94007

Lecture Notes in Computer Science 11627. Cham: Springer (ISBN 978-3-030-23695-3/pbk; 978-3-030-23696-0/ebook). xvi, 449 p. (2019).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1387.94004].
Indexed articles:
Appelbaum, Jacob; Martindale, Chloe; Wu, Peter, Tiny WireGuard tweak, 3-20 [Zbl 1454.94041]
Canard, Sébastien; Ferreira, Loïc, Extended 3-party ACCE and application to LoRaWAN 1.1, 21-38 [Zbl 1454.94057]
Budroni, Alessandro; Tenti, Andrea, The Mersenne Low Hamming Combination Search problem can be reduced to an ILP problem, 41-55 [Zbl 1454.94055]
Vitse, Vanessa, Simple oblivious transfer protocols compatible with supersingular isogenies, 56-78 [Zbl 1454.94102]
Shehhi, Hamad Al; Bellini, Emanuele; Borba, Filipe; Caullery, Florian; Manzano, Marc; Mateu, Victor, An IND-CCA-secure code-based encryption scheme using rank metric, 79-96 [Zbl 1454.94098]
Abdolmaleki, Behzad; Baghery, Karim; Lipmaa, Helger; Siim, Janno; Zając, Michał, UC-secure CRS generation for SNARKs, 99-117 [Zbl 1454.94036]
Baghery, Karim, On the efficiency of privacy-preserving smart contract systems, 118-136 [Zbl 1454.94110]
Das, Dipayan; Au, Man Ho; Zhang, Zhenfei, Ring signatures based on Middle-Product Learning with Errors problems, 139-156 [Zbl 1454.94114]
Walter, Michael, Sampling the integers with low relative error, 157-180 [Zbl 1454.94103]
Bai, Shi; Miller, Shaun; Wen, Weiqiang, A refined analysis of the cost for solving LWE via uSVP, 181-205 [Zbl 1454.94045]
Botros, Leon; Kannwischer, Matthias J.; Schwabe, Peter, Memory-efficient high-speed implementation of Kyber on Cortex-M4, 209-228 [Zbl 1454.94051]
Berti, Francesco; Pereira, Olivier; Standaert, François-Xavier, Reducing the cost of authenticity with leakages: a CIML2-secure AE scheme with one call to a strongly protected tweakable block cipher, 229-249 [Zbl 1454.94049]
Harmouch, Youssef; El Kouch, Rachid; Ben-Azza, Hussain, An improvement of correlation analysis for vectorial Boolean functions, 250-269 [Zbl 1454.94072]
ElSheikh, Muhammad; Abdelkhalek, Ahmed; Youssef, Amr M., On MILP-based automatic search for differential trails through modular additions with application to Bel-T, 273-296 [Zbl 1454.94066]
Bardeh, Navid Ghaedi; Rønjom, Sondre, Practical attacks on reduced-round AES, 297-310 [Zbl 1454.94047]
Balli, Fatih; Banik, Subhadeep, Six shades of AES, 311-329 [Zbl 1454.94046]
Massart, Clément; Standaert, François-Xavier, Revisiting location privacy from a side-channel analysis viewpoint, 333-351 [Zbl 1454.94086]
Ramesh, Sumesh Manjunath; AlKhzaimi, Hoda, Side channel analysis of SPARX-64/128: cryptanalysis and countermeasures, 352-369 [Zbl 1454.94091]
Wang, Ke; Jiang, Haodong, Analysis of two countermeasures against the signal leakage attack, 370-388 [Zbl 1454.94104]
Zambonin, Gustavo; S. P. Bittencourt, Matheus; Custódio, Ricardo, Handling vinegar variables to shorten rainbow key pairs, 391-408 [Zbl 1454.94107]
Ghadafi, Essam, Further lower bounds for structure-preserving signatures in asymmetric bilinear groups, 409-428 [Zbl 1454.94115]
Garms, Lydia; Quaglia, Elizabeth A., A new approach to modelling centralised reputation systems, 429-447 [Zbl 1454.94071]

MSC:

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest

Citations:

Zbl 1387.94004
Full Text: DOI