|
Showing 1 - 3 of
3 matches in All Departments
This book constitutes the refereed proceedings of the 11th
International Conference on the Theory and Application of
Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in
Rabat, Morocco, in July 2019. The 22 papers presented in this book
were carefully reviewed and selected from 53 submissions. The
papers are organized in topical sections on protocols; post-quantum
cryptography; zero-knowledge; lattice based cryptography; new
schemes and analysis; block ciphers; side-channel attacks and
countermeasures; signatures. AFRICACRYPT is a major scientific
event that seeks to advance and promote the field of cryptology on
the African continent. The conference has systematically drawn some
excellent contributions to the field. The conference has always
been organized in cooperation with the International Association
for Cryptologic Research (IACR).
This book constitutes the refereed proceedings of the 10th
International Conference on the Theory and Application of
Cryptographic Techniques in Africa, AFRICACRYPT 2018, held in
Marrakesh, Morocco, in May 2018. The 19 papers presented in this
book were carefully reviewed and selected from 54 submissions.
AFRICACRYPT is a major scientific event that seeks to advance and
promote the field of cryptology on the African continent. The
conference has systematically drawn some excellent contributions to
the field. The conference has always been organized in cooperation
with the International Association for Cryptologic Research (IACR).
This book constitutes the thoroughly refereed proceedings of the
8th International Conference on the Theory and Application of
Cryptographic Techniques in Africa, AFRICACRYPT 2016, held in Fes,
Morooco, in April 2016. The 18 papers presented in this book were
carefully reviewed and selected from 65 submissions. The aim of
Africacrypt 2016 is to provide an international forum for
practitioners and researchers from industry, academia and
government from all over the world for a wide ranging discussion of
all forms of cryptography. Topics of interest are such as lattices;
elliptic curves; secret-key cryptanalysis; efficient
implementations; secure protocols; and public-key cryptography.
|
|