Progress in Cryptology – AFRICACRYPT 2013

6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings

  • Amr Youssef
  • Abderrahmane Nitaj
  • Aboul Ella Hassanien
Conference proceedings AFRICACRYPT 2013

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7918)

Table of contents

  1. Front Matter
  2. Carlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit
    Pages 1-25
  3. Utsab Bose, Anup Kumar Bhattacharya, Abhijit Das
    Pages 26-42
  4. Kishan Chand Gupta, Indranil Ghosh Ray
    Pages 43-60
  5. Michael Clear, Arthur Hughes, Hitesh Tewari
    Pages 61-87
  6. Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade
    Pages 88-106
  7. Hassan Aly, Mohammed ElGayyar
    Pages 127-139
  8. Philippe Guillot, Abdelkrim Nimour, Duong Hieu Phan, Viet Cuong Trinh
    Pages 140-155
  9. Michael Hutter, Peter Schwabe
    Pages 156-172
  10. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
    Pages 189-207
  11. Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann, Willi Meier
    Pages 222-239
  12. Louis Goubin, Ange Martinelli, Matthieu Walle
    Pages 240-259
  13. Isheeta Nargis, Payman Mohassel, Wayne Eberly
    Pages 260-278
  14. David Gstir, Martin Schläffer
    Pages 359-374
  15. Michael Schneider
    Pages 375-391
  16. Fabian van den Broek, Erik Poll
    Pages 406-423
  17. Wei Yu, Kunpeng Wang, Bao Li, Song Tian
    Pages 424-432
  18. Wei Yu, Kunpeng Wang, Bao Li, Song Tian
    Pages 433-451
  19. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013.
The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices.


attacks digital signatures hash functions homomorphic encryption stream ciphers

Editors and affiliations

  • Amr Youssef
    • 1
  • Abderrahmane Nitaj
    • 2
  • Aboul Ella Hassanien
    • 3
  1. 1.Concordia Institute for Information Systems EngineeringConcordia UniversityMontrealCanada
  2. 2.Laboratoire de Mathématiques Nicolas OresmeUniversité de Caen Basse-NormandieCaenFrance
  3. 3.Department of Information TechnologyCairo UniversityCairoEgypt

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-38552-0
  • Online ISBN 978-3-642-38553-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment