Progress in cryptology -- AFRICACRYPT 2018 : 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings /: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings. (2018)
- Record Type:
- Book
- Title:
- Progress in cryptology -- AFRICACRYPT 2018 : 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings /: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings. (2018)
- Main Title:
- Progress in cryptology -- AFRICACRYPT 2018 : 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings
- Other Titles:
- AFRICACRYPT 2018
- Further Information:
- Note: Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi (eds.).
- Editors:
- Joux, Antoine
Nitaj, Abderrahmane
Rachidi, Tajjeeddine - Other Names:
- International Conference on Cryptology in Africa, 10th
- Contents:
- A Complete Characterization of Plateaued Boolean Functions in Terms of Their Cayley Graphs -- Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications -- Ubiquitous Weak-key Classes of BRW-polynomial Function -- Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count -- Two Simple Composition Theorems with H-coefficients -- Improved Related-Tweakey Boomerang Attacks on Deoxys-BC -- SCA-Resistance for AES: How Cheap Can We Go -- Cryptanalysis of 1-Round KECCAK -- Performing Computations on Hierarchically Shared Secrets -- Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge -- Unified Formulas for Some Deterministic Almost-injective Encodings into Hyperelliptic Curves -- HILA5 Pindakaas: On the CCA security of lattice-based encryption with error correction -- Large FHE Gates from Tensored Homomorphic Accumulator -- Two-Face: New Public Key Multivariate Schemes -- Cryptanalysis of RSA Variants with Modidied Euler Quotient -- Saber: Module-LWR Based Key Exchange, CPA-secure Encryption and CCA-secure KEM -- Practical Fault Injection on Deterministic Signatures: The Case of EdDSA -- Authentication with Weaker Trust Assumptions for Voting Systems -- Shorter Double-authentication Preventing Signatures for Small Address Spaces.
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xii, 363 pages), illustrations
- Subjects:
- 005.8/24
Computer science
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security
Data encryption (Computer science)
Computers -- Information Theory
Computers -- Hardware -- General
Computers -- Hardware -- Network Hardware
Computers -- Social Aspects -- Human-Computer Interaction
Algorithms & data structures
Computer hardware
Network hardware
Information technology: general issues
Computer security
Data structures (Computer science)
Computer hardware
Computer Communication Networks
Computers -- Security -- General
Computer security
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319893396
3319893394
3319893386
9783319893389 - Related ISBNs:
- 9783319893389
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed April 17, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.367581
- Ingest File:
- 01_346.xml