© 2016

Progress in Cryptology – AFRICACRYPT 2016

8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings

  • David Pointcheval
  • Abderrahmane Nitaj
  • Tajjeeddine Rachidi
Conference proceedings AFRICACRYPT 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9646)

Also part of the Security and Cryptology book sub series (LNSC, volume 9646)

Table of contents

  1. Front Matter
    Pages I-X
  2. Lattices

    1. Front Matter
      Pages 1-1
    2. Anja Becker, Thijs Laarhoven
      Pages 3-23
    3. Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer
      Pages 24-43
    4. Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson
      Pages 44-60
  3. Elliptic Curves

  4. Secret-Key Cryptanalysis

    1. Front Matter
      Pages 107-107
    2. Shahram Rasoolzadeh, Håvard Raddum
      Pages 109-126
    3. John Mattsson, Magnus Westerlund
      Pages 127-143
  5. Efficient Implementations

    1. Front Matter
      Pages 145-145
    2. Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic, Lejla Batina, Bohan Yang, Danilo Sijacic et al.
      Pages 147-166
  6. Secure Protocols

    1. Front Matter
      Pages 183-183
    2. Augustin P. Sarr, Philippe Elbaz–Vincent
      Pages 207-224
    3. Ge Bai, Ivan Damgård, Claudio Orlandi, Yu Xia
      Pages 225-244
    4. Ivan Damgård, Rasmus Zakarias
      Pages 245-264
    5. Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen
      Pages 265-284

About these proceedings


This book constitutes the thoroughly refereed proceedings of the 8th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016, held in Fes, Morooco, in April 2016.

The 18 papers presented in this book were carefully reviewed and selected from 65 submissions. The aim of Africacrypt 2016 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography. Topics of interest are such as lattices; elliptic curves; secret-key cryptanalysis; efficient implementations; secure protocols; and public-key cryptography.


Cryptanalysis Number theory Privacy-preserving protocols Public-key cryptography Symmetric cryptography Authentication Block and stream ciphers Cryptographic protocols Extended euclidean algorithm Hash functions Information-theoretic techniques Lattice-based cryptography Memetic algorithm Multiparty computation Optimization Public key encryption Real-time cryptography RSA Secret Key cryptography Security model

Editors and affiliations

  • David Pointcheval
    • 1
  • Abderrahmane Nitaj
    • 2
  • Tajjeeddine Rachidi
    • 3
  1. 1.Ecole Normale SupérieureParisFrance
  2. 2.University of CaenCaenFrance
  3. 3.Al Akhawayn University in IfraneIfraneMorocco

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment