Progress in Cryptology – AFRICACRYPT 2014

7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings

  • David Pointcheval
  • Damien Vergnaud
Conference proceedings AFRICACRYPT 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8469)

Table of contents

  1. Front Matter
  2. Philippe Gaborit, Olivier Ruatta, Julien Schrek, Gilles Zémor
    Pages 1-12
  3. Public-Key Cryptography

    1. Julien Devigne, Eleonora Guerrini, Fabien Laguillaumie
      Pages 13-30
    2. Afonso Arriaga, Qiang Tang, Peter Ryan
      Pages 31-50
    3. Kaoru Kurosawa, Le Trieu Phong
      Pages 51-68
  4. Hash Functions

    1. Sourav Das, Willi Meier
      Pages 69-87
    2. Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury
      Pages 88-108
    3. Riham AlTawy, Amr M. Youssef
      Pages 109-125
  5. Secret-Key Cryptanalysis

    1. Paul Bottinelli, Reza Reyhanitabar, Serge Vaudenay
      Pages 126-135
    2. Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi
      Pages 136-146
    3. Long Wen, Meiqin Wang, Andrey Bogdanov
      Pages 147-164
  6. Public-Key Cryptanalysis and Number Theory

    1. Liqiang Peng, Lei Hu, Jun Xu, Zhangjie Huang, Yonghong Xie
      Pages 165-177
    2. Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig
      Pages 178-198
  7. Hardware Implementation

    1. Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Marc Stöttinger
      Pages 235-250
    2. Vincent Grosso, Emmanuel Prouff, François-Xavier Standaert
      Pages 251-266
    3. Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
      Pages 267-284
  8. Protocols

    1. Kazuma Ohara, Kazuo Ohta, Koutarou Suzuki, Kazuki Yoneyama
      Pages 285-299
    2. Stefan Dziembowski, Maciej Zdanowicz
      Pages 300-317
  9. Lattice-Based Cryptography

    1. Tancrède Lepoint, Michael Naehrig
      Pages 318-335
    2. Rachid El Bansarkhani, Johannes Buchmann
      Pages 336-355
  10. Public-Key Cryptography

    1. Özgür Dagdelen, Daniele Venturi
      Pages 356-376
    2. Michael Clear, Hitesh Tewari, Ciarán McGoldrick
      Pages 377-397
    3. Y. Sreenivasa Rao, Ratna Dutta
      Pages 398-419
  11. Secret-Key Cryptography

    1. Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley et al.
      Pages 420-439
    2. Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
      Pages 440-458
  12. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2014, held in Marrakesh, Morocco in May 2014.
The 26 papers presented  together with 1 invited talk were carefully reviewed and selected from 83 submissions.
The aim of Africacrypt 2014 is to provide an international forum for practitioners and researchers from
industry, academia and government from all over the world for a wide ranging discussion of all forms of
cryptography and its applications as follows: Public-Key Cryptography, Hash Functions, Secret-Key Cryptanalysis, Number Theory, Hardware Implementation, Protocols, and Lattice-based Cryptography.


RSA block and stream ciphers cryptanalysis and other attacks cryptographic protocols error-correcting codes information-theoretic techniques mathematical foundations of cryptography public key encryption symmetric cryptography and hash functions

Editors and affiliations

  • David Pointcheval
    • 1
  • Damien Vergnaud
    • 1
  1. 1.Computer Science DepartmentEcole Normale SupérieureParisFrance

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-06733-9
  • Online ISBN 978-3-319-06734-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software