Progress in Cryptology - AFRICACRYPT 2017

9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings

  • Marc Joye
  • Abderrahmane Nitaj
Conference proceedings AFRICACRYPT 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10239)

Also part of the Security and Cryptology book sub series (LNSC, volume 10239)

Table of contents

  1. Front Matter
    Pages I-X
  2. Cryptographic Schemes

    1. Front Matter
      Pages 1-1
    2. Mohamed Saied Emam Mohamed, Albrecht Petzoldt
      Pages 3-20
  3. Side-Channel Analysis

    1. Front Matter
      Pages 59-59
    2. Stjepan Picek, Annelie Heuser, Alan Jovic, Axel Legay
      Pages 61-78
    3. Milena Djukanovic, Davide Bellizia, Giuseppe Scotti, Alessandro Trifiletti
      Pages 79-94
  4. Differential Cryptanalysis

    1. Front Matter
      Pages 115-115
    2. Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef
      Pages 117-134
    3. Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef
      Pages 135-146
  5. Applications

    1. Front Matter
      Pages 147-147
    2. Tushar Kanti Saha, Takeshi Koshiba
      Pages 149-164
    3. Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
      Pages 184-201
  6. Number Theory

    1. Front Matter
      Pages 203-203
    2. Michel Seck, Hortense Boudjou, Nafissatou Diarra, Ahmed Youssef Ould Cheikh Khlil
      Pages 205-222
  7. Back Matter
    Pages 231-231

About these proceedings


This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017.

The 13 papers presented in this book were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptographic schemes, side-channel analysis, differential cryptanalysis, applications, and number theory.


cryptography side-channel attacks elliptic curve-based cryptography hash functions cryptanalysis ring signatures machine learning techniques formal security analysis security protocols key management hardware attacks and countermeasures symmetric cryptography impossible differential information-theoretic techniques mathematical foundations of cryptography hardware attacks and countermeasures lossy encryption symmetric groups oblivious transfer query processing

Editors and affiliations

  • Marc Joye
    • 1
  • Abderrahmane Nitaj
    • 2
  1. 1.NXP Semiconductors San JoseUSA
  2. 2.University of Caen CaenFrance

Bibliographic information

Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment