Progress in Cryptology - AFRICACRYPT 2012

5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings

  • Aikaterini Mitrokotsa
  • Serge Vaudenay
Conference proceedings AFRICACRYPT 2012

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7374)

Table of contents

  1. Front Matter
  2. Signature Schemes

    1. Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer
      Pages 1-18
    2. Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel
      Pages 19-34
    3. Sébastien Canard, Amandine Jambert, Roch Lescuyer
      Pages 35-52
  3. Stream Ciphers

    1. Jingjing Wang, Xiangxue Li, Kefei Chen, Wenzheng Zhang
      Pages 53-66
  4. Applications of Information Theory

    1. Julien Bringer, Hervé Chabanne, Mélanie Favre
      Pages 67-81
    2. Mohammed Meziani, Gerhard Hoffmann, Pierre-Louis Cayrel
      Pages 99-116
  5. Block Ciphers

    1. Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta
      Pages 138-154
    2. Yue Sun, Meiqin Wang, Shujia Jiang, Qiumei Sun
      Pages 155-171
    3. Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof et al.
      Pages 172-187
  6. Network Security Protocols

    1. Augustin P. Sarr, Philippe Elbaz–Vincent
      Pages 203-220
  7. Public-Key Cryptography

    1. Abderrahmane Nitaj
      Pages 221-233
    2. Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter
      Pages 234-251
  8. Cryptanalysis of Hash Functions

    1. Ewan Fleischmann, Christian Forler, Stefan Lucks
      Pages 252-269
    2. Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann et al.
      Pages 270-286
    3. Elena Andreeva, Bart Mennink, Bart Preneel, Marjan Škrobot
      Pages 287-305
  9. Hash Functions: Design and Implementation

    1. Thierry P. Berger, Joffrey D’Hayer, Kevin Marquet, Marine Minier, Gaël Thomas
      Pages 306-323
    2. Peter Schwabe, Bo-Yin Yang, Shang-Yi Yang
      Pages 324-341
  10. Algorithms for Public-Key Cryptography

    1. Nashwa A. F. Mohamed, Mohsin H. A. Hashim, Michael Hutter
      Pages 342-359
    2. Houssem Maghrebi, Claude Carlet, Sylvain Guilley, Jean-Luc Danger
      Pages 360-377
  11. Cryptographic Protocols

    1. Paolo D’Arco, María Isabel González Vasco, Angel L. Pérez del Pozo, Claudio Soriente
      Pages 378-394
  12. Invited Talks

    1. Willi Meier
      Pages 412-412
  13. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.


RSA attacks authentication homomorphic encryption performance evaluation

Editors and affiliations

  • Aikaterini Mitrokotsa
    • 1
  • Serge Vaudenay
    • 1
  1. 1.Ecole Polytechnice Fédérale de Lausanne, IC - LASECLausanneSwitzerland

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-31409-4
  • Online ISBN 978-3-642-31410-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Finance, Business & Banking