Progress in Cryptology – AFRICACRYPT 2008

First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

  • Editors
  • Serge Vaudenay
Conference proceedings AFRICACRYPT 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5023)

Table of contents

  1. Front Matter
  2. AES

    1. Samuel Galice, Marine Minier
      Pages 1-15
    2. Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy
      Pages 16-26
  3. Analysis of RFID Protocols

  4. Invited Talk

    1. Bruce Schneier
      Pages 50-79
  5. Cryptographic Protocols

  6. Authentication

    1. Luk Bettale, Jean-Charles Faugère, Ludovic Perret
      Pages 143-155
  7. Public-Key Cryptography

    1. Abderrahmane Nitaj
      Pages 174-190
    2. Michael J. Jacobson Jr., Renate Scheidler, Daniel Weimer
      Pages 191-208
  8. Pseudorandomness

  9. Analysis of Stream Ciphers

    1. Pascal Delaunay, Antoine Joux
      Pages 221-235
    2. Simon Fischer, Shahram Khazaei, Willi Meier
      Pages 236-245
    3. Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matt Robshaw, Gautham Sekar
      Pages 246-257
    4. Christophe De Cannière, Özgül Küçük, Bart Preneel
      Pages 276-289
  10. Hash Functions

    1. Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
      Pages 290-307
    2. Jean-Philippe Aumasson, Raphael C. -W. Phan
      Pages 308-324
  11. Broadcast Encryption

    1. David Lubicz, Thomas Sirvent
      Pages 325-342
    2. Per Austrin, Gunnar Kreitz
      Pages 343-356
  12. Invited Talk

  13. Implementation

    1. Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe
      Pages 371-388
    2. Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, Christiane Peters
      Pages 389-405
  14. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008.

The 25 revised full papers presented together with 2 invited papers were carefully selected during two rounds of reviewing and improvement from 82 submissions. The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.


AES anonymity authenticated encryption authentication biometrics block cipher crpytographic protocols cryptanalysis cryptography cypher implementation elliptic curves fourier transform keyed hash functions pairing-b radio-frequency identification (RFID)

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-68159-5
  • Online ISBN 978-3-540-68164-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Finance, Business & Banking