• Home
  • Useful links
  • Sitemap
  • Contact Us
  • AfricaCrypt 2012
    • AfricaCrypt 2012
    • Invited Speakers
    • Important Dates
    • Conference Chairs
    • Call for Sponsors
    • Fellowship Program
    • Presentations
    • Pictures
  • Conference
    • Call for Papers
    • Paper Submission
    • Program
    • Registration
    • Proceedings
  • Information
    • Accommodation
    • Travel Information
    • Visa
    • About AUI
    • About Ifrane
    • Conference Excursion
  • Contact
    • Contact Us
    • Local Organizing Committee
registrationJoin Today Call for PapersSubmit

AfricaCrypt' 2012 Talks

 

Africacrypt' 2012 Talks and Presentations  

 

  • FUZZY VAULT.pdf
  • Shift-Type Homomorphic Encryption.pdf
  • Bounds and Constructions for 1-Round.pdf
  • batch verification.pdf
  • Extended Security Arguments for Signature.pdf
  • Sanitizable Signatures with Several Signers.pdf
  • Improving the Performance of the SYND Stream.pdf
  • The GLUON family a lightweight Hash function.pdf
  • Impossible Differential Cryptanalysis of TEA.pdf
  • The Collision Security of MDC-4.pdf
  • Size Hiding in Private.pdf
  • A new attack on RSA and CRT-RSA.pdf
  • Round-optimal-Xiao.pdf
  • SHA-3 on ARM11 processors.pdf
  • Optimal First-Order Masking.pdf
  • Improved Fixed-base Comb Method.pdf
  • Presentation of E-Commerce Conseil.pdf
  • QA in H.E. What, Why, and How.pdf
  • Stream Ciphers.pdf
  • Differential Cryptanalysis Of ICEBERG.pdf
  • FULLY HOMOMORPHIC ENCRYPTION.pdf
  • Security Analysis of the 3rd Round-SHA3.pdf
  • SPN_hash.pdf

Organizers

Sponsors

 

Partners


In partnership with the Région Meknès Tafilalet

facebook twitter linkedin rss

©The fifth international conference on Cryptology, Africacrypt 2012