did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642126772

Progress in Cryptology - AFRICACRYPT 2010: Third INternational Conference on Cryptology in Africa Stellenbosch, South Africa, May 3-6, 2010 Proceedings

by
  • ISBN13:

    9783642126772

  • ISBN10:

    3642126774

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2010-06-01
  • Publisher: SPRINGER
  • Purchase Benefits
List Price: $129.00

Summary

This book constitutes the proceedings of the Third International Conference on Cryptology in Africa, AFRICACRYPT 2010, held in Stellenbosch, South Africa, on May 3-6, 2010. The 25 papers presented together with three invited talks were carefully reviewed and selected from 82 submissions. The topics covered are signatures, attacks, protocols, networks, elliptic curves, side-channel attacks and fault attacks, public-key encryption, keys and PUFs, and ciphers and hash functions.

Table of Contents

Signatures
A New RSA-Based Signature Schemep. 1
Fair Blind Signatures without Random Oraclesp. 16
Fair Partially Blind Signaturesp. 34
Attacks
Parallel Shortest Lattice Vector Enumeration on Graphics Cardsp. 52
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2p. 69
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bitsp. 82
Protocols
Proofs of Restricted Shufflesp. 100
Batch Range Proof for Practical Small Rangesp. 114
Optimistic Fair Priced Oblivious Transferp. 131
Networks
Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codesp. 148
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemesp. 166
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resiliencep. 184
Elliptic Curves
Avoiding Full Extension Field Arithmetic in Pairing Computationsp. 203
ECC2K-130 on Cell CPUsp. 225
Side-Channel Attacks and Fault Attacks
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Acceleratorp. 243
Differential Fault Analysis of HC-128p. 261
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devicesp. 279
Public-Key Encryption
Strong Cryptography from Weak Secrets: Building Efficient PKE and IBE from Distributed Passwordsp. 297
Efficient Unidirectional Proxy Re-Encryptionp. 316
Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitionsp. 333
Keys and PUFs
Flexible Group Key Exchange with On-demand Computation of Subgroup Keysp. 351
Quantum Readout of Physical Unclonable Functions Boris ¿koricp. 369
Ciphers and Hash Functions
Parallelizing the Camellia and SMS4 Block Ciphersp. 387
Improved Linear Differential Attacks on CubeHashp. 407
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512p. 419
Author Indexp. 437
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program