My Account Log in

1 option

Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008, Proceedings / edited by Serge Vaudenay.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Vaudenay, Serge, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 5023.
Security and Cryptology ; 5023
Language:
English
Subjects (All):
Data encryption (Computer science).
Coding theory.
Information theory.
Computer networks.
Computer security.
Algorithms.
Computer science--Mathematics.
Computer science.
Cryptology.
Coding and Information Theory.
Computer Communication Networks.
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Local Subjects:
Cryptology.
Coding and Information Theory.
Computer Communication Networks.
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Physical Description:
1 online resource (XI, 420 pages).
Edition:
First edition 2008.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008. The 25 revised full papers presented together with 2 invited papers were carefully selected during two rounds of reviewing and improvement from 82 submissions. The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.
Contents:
AES
Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds
Implementation of the AES-128 on Virtex-5 FPGAs
Analysis of RFID Protocols
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol
Differential Cryptanalysis of Reduced-Round PRESENT
Invited Talk
The Psychology of Security
Cryptographic Protocols
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees
Robust Threshold Schemes Based on the Chinese Remainder Theorem
An Authentication Protocol with Encrypted Biometric Data
Authentication
Authenticated Encryption Mode for Beyond the Birthday Bound Security
Cryptanalysis of the TRMS Signature Scheme of PKC'05
Public-Key Cryptography
New Definition of Density on Knapsack Cryptosystems
Another Generalization of Wiener's Attack on RSA
An Adaptation of the NICE Cryptosystem to Real Quadratic Orders
Pseudorandomness
A Proof of Security in O(2 n ) for the Benes Scheme
Analysis of Stream Ciphers
Yet Another Attack on Vest
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
Correlated Keystreams in Moustique
Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State
Analysis of Grain's Initialization Algorithm
Hash Functions
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?
Broadcast Encryption
Attribute-Based Broadcast Encryption Scheme Made Efficient
Lower Bounds for Subset Cover Based Broadcast Encryption
A Brief History of Provably-Secure Public-Key Encryption
Implementation
On Compressible Pairings and Their Computation
Twisted Edwards Curves
Efficient Multiplication in , m???1 and 5???????18.
Other Format:
Printed edition:
ISBN:
978-3-540-68164-9
9783540681649
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account