Progress in Cryptology – AFRICACRYPT 2009

Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings

  • Bart Preneel
Conference proceedings AFRICACRYPT 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5580)

Table of contents

  1. Front Matter
  2. Hash Functions

    1. Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen
      Pages 14-28
    2. Florian Mendel
      Pages 29-40
  3. Block Ciphers

    1. Joana Treger, Jacques Patarin
      Pages 41-59
    2. Marine Minier, Raphael C. -W. Phan, Benjamin Pousse
      Pages 60-76
  4. Asymmetric Encryption

    1. Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani
      Pages 77-97
    2. Abderrahmane Nitaj
      Pages 98-115
  5. Digital Signatures

    1. Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
      Pages 116-134
    2. David Galindo, Flavio D. Garcia
      Pages 135-148
    3. Go Ohtake, Arisa Fujii, Goichiro Hanaoka, Kazuto Ogawa
      Pages 149-166
    4. İlker Nadi Bozkurt, Kamer Kaya, Ali Aydın Selçuk
      Pages 167-178
  6. Asymmetric Encryption and Anonymity

    1. Pooya Farshim, Bogdan Warinschi
      Pages 179-197
    2. Siamak F. Shahandashti, Reihaneh Safavi-Naini
      Pages 198-216
  7. Key Agreement Protocols

    1. Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval
      Pages 254-271
  8. Cryptographic Protocols

  9. Efficient Implementations

    1. Marc Joye, Michael Tunstall
      Pages 334-349
    2. Neil Costigan, Peter Schwabe
      Pages 368-385
    3. Billy Bob Brumley, Kaisa Nyberg
      Pages 386-402
  10. Implementation Attacks

    1. Markus Kasper, Timo Kasper, Amir Moradi, Christof Paar
      Pages 403-420
  11. Back Matter

About these proceedings


This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009.

The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered are hash functions, block ciphers, asymmetric encryption, digital signatures, asymmetric encryption and anonymity, key agreement protocols, cryptographic protocols, efficient implementations, and implementation attacks.


AES DES Information anonymity authenticated encryption authentication biometrics block cipher cryptanalysis cryptographic protocols cryptography elliptic curves hash functions keyed hash functions lightweight cryptography

Editors and affiliations

  • Bart Preneel
    • 1
  1. 1.Dept. Electrical Engineering-ESAT/COSICKatholieke Universiteit LeuvenLeuvenBelgium

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-02383-5
  • Online ISBN 978-3-642-02384-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software