Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
AFRICACRYPT
2010
Springer
10 years 10 months ago
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
David Galindo, Benoît Libert, Marc Fischlin,...
AFRICACRYPT
2010
Springer
11 years 3 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
AFRICACRYPT
2010
Springer
11 years 3 months ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
AFRICACRYPT
2010
Springer
11 years 4 months ago
Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsu...
AFRICACRYPT
2010
Springer
11 years 4 months ago
Batch Range Proof for Practical Small Ranges
Kun Peng, Feng Bao
AFRICACRYPT
2010
Springer
11 years 4 months ago
Proofs of Restricted Shuffles
Björn Terelius, Douglas Wikström
AFRICACRYPT
2010
Springer
11 years 4 months ago
Parallelizing the Camellia and SMS4 Block Ciphers
Huihui Yap, Khoongming Khoo, Axel Poschmann
AFRICACRYPT
2010
Springer
11 years 4 months ago
Differential Fault Analysis of HC-128
Aleksandar Kircanski, Amr M. Youssef
AFRICACRYPT
2010
Springer
11 years 4 months ago
Strong Cryptography from Weak Secrets
the full version of the extended abstract which appears in Africacrypt ’10 (3 – 6 may 2010, Stellenbosch, South Africa) D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 60...
Xavier Boyen, Céline Chevalier, Georg Fuchs...
books