researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2008
2009
2010
2011
2012
2013
2014
2016
2017
2018
2019
2020
2022
2023
Filter by Tag
OR
AND
NOT
1
C++
Pascal
analysis
data-flow
design
e-science
history
information retrieval
pattern matching
protocol
rule-based
security
Filter by Author
[+]
OR
AND
NOT
1
Abderrahmane Nitaj
Ahmed Abdelkhalek 0001
Amr M. Youssef
Axel Poschmann
Bart Preneel
Christian Rechberger
Debdeep Mukhopadhyay
François-Xavier Standaert
Georg Fuchsbauer
Hervé Chabanne
Jacques Patarin
Johannes Buchmann
Julien Bringer
Lejla Batina
Marine Minier
Meiqin Wang
Peter Schwabe
Pierre-Louis Cayrel
Willi Meier
Yu Sasaki
Filter by Top terms
[+]
OR
AND
NOT
1
africa
africacrypt
analysis
attack
attacks
conference
cryptanalysis
cryptology
differential
efficient
encryption
international
key
new
scheme
schemes
secure
security
signatures
using
AFRICACRYPT (africacrypt)
Editions
Publications
Viewing Publication 1 - 100 from 336
2023
Poseidon2: A Faster Version of the Poseidon Hash Function
Lorenzo Grassi 0001
,
Dmitry Khovratovich
,
Markus Schofnegger
.
africacrypt 2023
:
177-203
[doi]
MinRank in the Head - Short Signatures from Zero-Knowledge Proofs
Gora Adj
,
Luis Rivera-Zamarripa
,
Javier A. Verbel
.
africacrypt 2023
:
3-27
[doi]
The Special Case of Cyclotomic Fields in Quantum Algorithms for Unit Groups
Razvan Barbulescu
,
Adrien Poulalion
.
africacrypt 2023
:
229-251
[doi]
Impossibilities in Succinct Arguments: Black-Box Extraction and More
Matteo Campanelli
,
Chaya Ganesh
,
Hamidreza Khoshakhlagh
,
Janno Siim
.
africacrypt 2023
:
465-489
[doi]
Take Your MEDS: Digital Signatures from Matrix Code Equivalence
Tung Chou
,
Ruben Niederhagen
,
Edoardo Persichetti
,
Tovohery Hajatiana Randrianarisoa
,
Krijn Reijnders
,
Simona Samardjiska
,
Monika Trimoska
.
africacrypt 2023
:
28-52
[doi]
ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain
Pierre-Emmanuel Clet
,
Aymen Boudguiga
,
Renaud Sirdey
,
Martin Zuber
.
africacrypt 2023
:
317-343
[doi]
n)-Isogenies
Thomas Decru
,
Sabrina Kunzweiler
.
africacrypt 2023
:
53-78
[doi]
Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices
Koustabh Ghosh
,
Jonathan Fuchs
,
Parisa Amiri-Eliasi
,
Joan Daemen
.
africacrypt 2023
:
129-150
[doi]
Invertible Quadratic Non-linear Functions over $\mathbb {F}_p^n$ via Multiple Local Maps
Ginevra Giordani
,
Lorenzo Grassi 0001
,
Silvia Onofri
,
Marco Pedicini
.
africacrypt 2023
:
151-176
[doi]
Concrete Security from Worst-Case to Average-Case Lattice Reductions
Joel Gärtner
.
africacrypt 2023
:
344-369
[doi]
Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7
James Howe
,
Bas Westerbaan
.
africacrypt 2023
:
442-462
[doi]
On the Post-quantum Security of Classical Authenticated Encryption Schemes
Nathalie Lang
,
Stefan Lucks
.
africacrypt 2023
:
79-104
[doi]
Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality
Mario Larangeira
,
Maxim Jourenko
.
africacrypt 2023
:
285-313
[doi]
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers
Jikang Lin
,
Jiahui He
,
Yanhong Fan
,
Meiqin Wang
.
africacrypt 2023
:
204-226
[doi]
Applications of Timed-Release Encryption with Implicit Authentication
Angelique Faye Loe
,
Liam Medley
,
Christian O'Connell
,
Elizabeth A. Quaglia
.
africacrypt 2023
:
490-515
[doi]
Finding and Evaluating Parameters for BGV
Johannes Mono
,
Chiara Marcolla
,
Georg Land
,
Tim Güneysu
,
Najwa Aaraj
.
africacrypt 2023
:
370-394
[doi]
Progress in Cryptology - AFRICACRYPT 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings
Nadia El Mrabet
,
Luca De Feo
,
Sylvain Duquesne
, editors,
Volume 14064 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions
Duc Tri Nguyen
,
Kris Gaj
.
africacrypt 2023
:
417-441
[doi]
Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant
Abderrahmane Nitaj
,
Maher Boudabra
.
africacrypt 2023
:
252-269
[doi]
The Curious Case of the Half-Half Bitcoin ECDSA Nonces
Dylan Rowe
,
Joachim Breitner
,
Nadia Heninger
.
africacrypt 2023
:
273-284
[doi]
A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial
Boly Seck
,
Pierre-Louis Cayrel
,
Vlad-Florin Dragoi
,
Idy Diop
,
Morgan Barbier
,
Jean Belo Klamti
,
Vincent Grosso
,
Brice Colombier
.
africacrypt 2023
:
105-125
[doi]
Quantum Search-to-Decision Reduction for the LWE Problem
Kyohei Sudo
,
Masayuki Tezuka
,
Keisuke Hara
,
Yusuke Yoshida
.
africacrypt 2023
:
395-413
[doi]
2022
Cryptanalysis of Reduced Round SPEEDY
Raghvendra Rohit 0001
,
Santanu Sarkar 0001
.
africacrypt 2022
:
133-149
[doi]
An Estimator for the Hardness of the MQ Problem
Emanuele Bellini 0002
,
Rusydi H. Makarim
,
Carlo Sanna
,
Javier A. Verbel
.
africacrypt 2022
:
323-347
[doi]
Finding Low-Weight Polynomial Multiples Using the Rho Method
Laila El Aimani
.
africacrypt 2022
:
550-575
[doi]
A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption
Mónica P. Arenas
,
Muhammed Ali Bingöl
,
Hüseyin Demirci
,
Georgios Fotiadis
,
Gabriele Lenzini
.
africacrypt 2022
:
425-447
[doi]
Recovering Rainbow's Secret Key with a First-Order Fault Attack
Thomas Aulbach
,
Tobias Kovats
,
Juliane Krämer
,
Soundes Marzougui
.
africacrypt 2022
:
348-368
[doi]
Progress in Cryptology - AFRICACRYPT 2022: 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18-20, 2022, Proceedings
Lejla Batina
,
Joan Daemen
, editors,
Lecture Notes in Computer Science
, Springer Nature Switzerland,
2022.
[doi]
Identity-Based Encryption in DDH Hard Groups
Olivier Blazy
,
Saqib A. Kakvi
.
africacrypt 2022
:
81-102
[doi]
Dilithium for Memory Constrained Devices
Joppe W. Bos
,
Joost Renes
,
Amber Sprenkels
.
africacrypt 2022
:
217-235
[doi]
Breaking Panther
Christina Boura
,
Rachelle Heim Boissier
,
Yann Rotella
.
africacrypt 2022
:
176-188
[doi]
A Small GIFT-COFB: Lightweight Bit-Serial Architectures
Andrea Caforio
,
Daniel Collins
,
Subhadeep Banik
,
Francesco Regazzoni 0001
.
africacrypt 2022
:
53-77
[doi]
EHNP Strikes Back: Analyzing SM2 Implementations
Jinzheng Cao
,
Qingfeng Cheng
,
Jian Weng 0001
.
africacrypt 2022
:
576-600
[doi]
A Random Oracle for All of Us
Marc Fischlin
,
Felix Rohrbach
,
Tobias Schmalz
.
africacrypt 2022
:
469-489
[doi]
Construction of Recursive MDS Matrices Using DLS Matrices
Kishan Chand Gupta
,
Sumit Kumar Pandey
,
Susanta Samanta
.
africacrypt 2022
:
3-27
[doi]
FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix
Kishan Chand Gupta
,
Sumit Kumar Pandey
,
Susanta Samanta
.
africacrypt 2022
:
28-52
[doi]
Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards
Rikuo Haga
,
Yu-ichi Hayashi
,
Daiki Miyahara
,
Takaaki Mizuki
.
africacrypt 2022
:
448-468
[doi]
TransNet: Shift Invariant Transformer Network for Side Channel Analysis
Suvadeep Hajra
,
Sayandeep Saha
,
Manaar Alam
,
Debdeep Mukhopadhyay
.
africacrypt 2022
:
371-396
[doi]
Co-factor Clearing and Subgroup Membership Testing on Pairing-Friendly Curves
Youssef El Housni
,
Aurore Guillevic
,
Thomas Piellard
.
africacrypt 2022
:
518-536
[doi]
Lattice-Based Inner Product Argument
Veronika Kuchta
,
Rajeev Anand Sahu
,
Gaurav Sharma 0006
.
africacrypt 2022
:
236-268
[doi]
Automated Key Recovery Attacks on Round-Reduced Orthros
Muzhou Li
,
Ling Sun 0001
,
Meiqin Wang
.
africacrypt 2022
:
189-213
[doi]
Streaming SPHINCS+ for Embedded Devices Using the Example of TPMs
Ruben Niederhagen
,
Johannes Roth
,
Julian Wälde
.
africacrypt 2022
:
269-291
[doi]
A Generalized Attack on the Multi-prime Power RSA
Abderrahmane Nitaj
,
Willy Susilo
,
Joseph Tonien
.
africacrypt 2022
:
537-549
[doi]
To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA
Azade Rezaeezade
,
Guilherme Perin
,
Stjepan Picek
.
africacrypt 2022
:
397-421
[doi]
And Rijndael?: Automatic Related-Key Differential Analysis of Rijndael
Loïc Rouquette
,
David Gérault
,
Marine Minier
,
Christine Solnon
.
africacrypt 2022
:
150-175
[doi]
DiSSECT: Distinguisher of Standard and Simulated Elliptic Curves via Traits
Vladimir Sedlacek
,
Vojtech Suchanek
,
Antonin Dufka
,
Marek Sýs
,
Vashek Matyas
.
africacrypt 2022
:
493-517
[doi]
Solving the Learning Parity with Noise Problem Using Quantum Algorithms
Bénédikt Tran
,
Serge Vaudenay
.
africacrypt 2022
:
295-322
[doi]
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks
Marloes Venema
,
Greg Alpár
.
africacrypt 2022
:
103-129
[doi]
2020
MixColumns Coefficient Property and Security of the AES with A Secret S-Box
Xin An
,
Kai Hu
,
Meiqin Wang
.
africacrypt 2020
:
114-131
[doi]
Attacking RSA Using an Arbitrary Parameter
Muhammad Rezal Kamel Ariffin
,
Amir Hamzah Abd Ghafar
,
Muhammad Asyraf Asbullah
.
africacrypt 2020
:
382-399
[doi]
Signatures of Knowledge for Boolean Circuits Under Standard Assumptions
Karim Baghery
,
Alonso-González
,
Zaira Pindado
,
Carla Ràfols
.
africacrypt 2020
:
24-44
[doi]
On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol
Andrea Basso
,
Péter Kutas
,
Simon-Philipp Merz
,
Christophe Petit
,
Charlotte Weitkämper
.
africacrypt 2020
:
195-213
[doi]
LESS is More: Code-Based Signatures Without Syndromes
Jean-François Biasse
,
Giacomo Micheli
,
Edoardo Persichetti
,
Paolo Santini
.
africacrypt 2020
:
45-65
[doi]
LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4
Fabio Campos
,
Tim Kohlstadt
,
Steffen Reith
,
Marc Stöttinger
.
africacrypt 2020
:
258-277
[doi]
UC Updatable Databases and Applications
Aditya Damodaran
,
Alfredo Rial
.
africacrypt 2020
:
66-87
[doi]
Sieve, Enumerate, Slice, and Lift: - Hybrid Lattice Algorithms for SVP via CVPP
Emmanouil Doulgerakis
,
Thijs Laarhoven
,
Benne de Weger
.
africacrypt 2020
:
301-320
[doi]
BBB Secure Nonce Based MAC Using Public Permutations
Avijit Dutta
,
Mridul Nandi
.
africacrypt 2020
:
172-191
[doi]
New Ideas to Build Noise-Free Homomorphic Cryptosystems
Gérald Gavin
,
Sandrine Tainturier
.
africacrypt 2020
:
423-451
[doi]
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder
Aaron Hutchinson
,
Koray Karabina
.
africacrypt 2020
:
403-422
[doi]
Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression
Meenakshi Kansal
,
Ratna Dutta
.
africacrypt 2020
:
281-300
[doi]
A Tale of Three Signatures: Practical Attack of ECDSA with wNAF
Gabrielle De Micheli
,
Rémi Piau
,
Cécile Pierrot
.
africacrypt 2020
:
361-381
[doi]
Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings
Abderrahmane Nitaj
,
Amr M. Youssef
, editors,
Volume 12174 of
Lecture Notes in Computer Science
, Springer,
2020.
[doi]
Cryptanalysis of FlexAEAD
Mostafizar Rahman
,
Dhiman Saha
,
Goutam Paul 0001
.
africacrypt 2020
:
152-171
[doi]
When Similarities Among Devices are Taken for Granted: Another Look at Portability
Unai Rioja
,
Lejla Batina
,
Igor Armendariz
.
africacrypt 2020
:
337-357
[doi]
Online Template Attack on ECDSA: - Extracting Keys via the Other Side
Niels Roelofs
,
Niels Samwel
,
Lejla Batina
,
Joan Daemen
.
africacrypt 2020
:
323-336
[doi]
QA-NIZK Arguments of Same Opening for Bilateral Commitments
Carla Ràfols
,
Javier Silva 0001
.
africacrypt 2020
:
3-23
[doi]
New Results on the SymSum Distinguisher on Round-Reduced SHA3
Sahiba Suryawanshi
,
Dhiman Saha
,
Satyam Sachan
.
africacrypt 2020
:
132-151
[doi]
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE
Mohamed Tolba
,
Muhammad ElSheikh
,
Amr M. Youssef
.
africacrypt 2020
:
91-113
[doi]
A SAT-Based Approach for Index Calculus on Binary Elliptic Curves
Monika Trimoska
,
Sorina Ionica
,
Gilles Dequen
.
africacrypt 2020
:
214-235
[doi]
Hash-Based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security
Mahmoud Yehia
,
Riham AlTawy
,
T. Aaron Gulliver
.
africacrypt 2020
:
239-257
[doi]
2019
Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings
Johannes Buchmann 0001
,
Abderrahmane Nitaj
,
Tajje-eddine Rachidi
, editors,
Volume 11627 of
Lecture Notes in Computer Science
, Springer,
2019.
[doi]
UC-Secure CRS Generation for SNARKs
Behzad Abdolmaleki
,
Karim Baghery
,
Helger Lipmaa
,
Janno Siim
,
Michal Zajac 0001
.
africacrypt 2019
:
99-117
[doi]
Tiny WireGuard Tweak
Jacob Appelbaum
,
Chloe Martindale
,
Peter Wu
.
africacrypt 2019
:
3-20
[doi]
On the Efficiency of Privacy-Preserving Smart Contract Systems
Karim Baghery
.
africacrypt 2019
:
118-136
[doi]
A Refined Analysis of the Cost for Solving LWE via uSVP
Shi Bai
,
Shaun Miller
,
Weiqiang Wen
.
africacrypt 2019
:
181-205
[doi]
Six Shades of AES
Fatih Balli
,
Subhadeep Banik
.
africacrypt 2019
:
311-329
[doi]
Practical Attacks on Reduced-Round AES
Navid Ghaedi Bardeh
,
Sondre Rønjom
.
africacrypt 2019
:
297-310
[doi]
Reducing the Cost of Authenticity with Leakages: a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Francesco Berti
,
Olivier Pereira
,
François-Xavier Standaert
.
africacrypt 2019
:
229-249
[doi]
Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4
Leon Botros
,
Matthias J. Kannwischer
,
Peter Schwabe
.
africacrypt 2019
:
209-228
[doi]
The Mersenne Low Hamming Combination Search Problem Can Be Reduced to an ILP Problem
Alessandro Budroni
,
Andrea Tenti
.
africacrypt 2019
:
41-55
[doi]
Extended 3-Party \textACCE and Application to LoRaWAN 1.1
Sébastien Canard
,
Loïc Ferreira
.
africacrypt 2019
:
21-38
[doi]
Ring Signatures Based on Middle-Product Learning with Errors Problems
Dipayan Das
,
Man Ho Au
,
Zhenfei Zhang
.
africacrypt 2019
:
139-156
[doi]
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T
Muhammad ElSheikh
,
Ahmed Abdelkhalek 0001
,
Amr M. Youssef
.
africacrypt 2019
:
273-296
[doi]
A New Approach to Modelling Centralised Reputation Systems
Lydia Garms
,
Elizabeth A. Quaglia
.
africacrypt 2019
:
429-447
[doi]
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups
Essam Ghadafi
.
africacrypt 2019
:
409-428
[doi]
An Improvement of Correlation Analysis for Vectorial Boolean Functions
Youssef Harmouch
,
Rachid El Kouch
,
Hussain Ben-Azza
.
africacrypt 2019
:
250-269
[doi]
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint
Clément Massart
,
François-Xavier Standaert
.
africacrypt 2019
:
333-351
[doi]
Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures
Sumesh Manjunath Ramesh
,
Hoda AlKhzaimi
.
africacrypt 2019
:
352-369
[doi]
An IND-CCA-Secure Code-Based Encryption Scheme Using Rank Metric
Hamad Al Shehhi
,
Emanuele Bellini 0002
,
Filipe Borba
,
Florian Caullery
,
Marc Manzano
,
Víctor Mateu
.
africacrypt 2019
:
79-96
[doi]
Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies
Vanessa Vitse
.
africacrypt 2019
:
56-78
[doi]
Sampling the Integers with Low Relative Error
Michael Walter
.
africacrypt 2019
:
157-180
[doi]
Analysis of Two Countermeasures Against the Signal Leakage Attack
Ke Wang
,
Haodong Jiang
.
africacrypt 2019
:
370-388
[doi]
Handling Vinegar Variables to Shorten Rainbow Key Pairs
Gustavo Zambonin
,
Matheus S. P. Bittencourt
,
Ricardo Felipe Custódio
.
africacrypt 2019
:
391-408
[doi]
2018
Cryptanalysis of 1-Round KECCAK
Rajendra Kumar
,
Mahesh Sreekumar Rajasree
,
Hoda AlKhzaimi
.
africacrypt 2018
:
124-137
[doi]
Authentication with Weaker Trust Assumptions for Voting Systems
Elizabeth A. Quaglia
,
Ben Smyth
.
africacrypt 2018
:
322-343
[doi]
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC
Yu Sasaki
.
africacrypt 2018
:
87-106
[doi]
Unified Formulas for Some Deterministic Almost-Injective Encodings into Hyperelliptic Curves
Michel Seck
,
Nafissatou Diarra
.
africacrypt 2018
:
183-202
[doi]
Lightweight MDS Serial-Type Matrices with Minimal Fixed XOR Count
Dylan Toh
,
Jacob Teo
,
Khoongming Khoo
,
Siang Meng Sim
.
africacrypt 2018
:
51-71
[doi]
Performing Computations on Hierarchically Shared Secrets
Giulia Traverso
,
Denise Demirel
,
Johannes Buchmann 0001
.
africacrypt 2018
:
141-161
[doi]
Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge
Masaya Yasuda
,
Junpei Yamaguchi
,
Michiko Ooka
,
Satoshi Nakamura
.
africacrypt 2018
:
162-182
[doi]
Sign in
or
sign up
to see more results.