Sciweavers

AFRICACRYPT
2010
Springer
13 years 4 months ago
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
David Galindo, Benoît Libert, Marc Fischlin,...
AFRICACRYPT
2010
Springer
13 years 8 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
AFRICACRYPT
2010
Springer
13 years 8 months ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
AFRICACRYPT
2010
Springer
13 years 9 months ago
Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsu...
AFRICACRYPT
2010
Springer
13 years 10 months ago
Batch Range Proof for Practical Small Ranges
Kun Peng, Feng Bao
AFRICACRYPT
2010
Springer
13 years 10 months ago
Proofs of Restricted Shuffles
Björn Terelius, Douglas Wikström
AFRICACRYPT
2010
Springer
13 years 10 months ago
Parallelizing the Camellia and SMS4 Block Ciphers
Huihui Yap, Khoongming Khoo, Axel Poschmann
AFRICACRYPT
2010
Springer
13 years 10 months ago
Differential Fault Analysis of HC-128
Aleksandar Kircanski, Amr M. Youssef
AFRICACRYPT
2010
Springer
13 years 10 months ago
Strong Cryptography from Weak Secrets
the full version of the extended abstract which appears in Africacrypt ’10 (3 – 6 may 2010, Stellenbosch, South Africa) D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 60...
Xavier Boyen, Céline Chevalier, Georg Fuchs...