Home | FAQ | Contact | A.M.C |
AfricaCrypt 2008
Casablanca, Morocco, JUNE 11-14; 2008

Version française Version espagnole Version marocaine

Call for Papers
Invited Speakers
Accepted Papers
Rump Session
Travel Info
Related Events

List of Accepted Papers   


Casablanca, Morocco, June 11-14, 2008


Invited Speakers :

T. El Gamal, J. Stern, B. Schneier, A. Dent

Accepted papers

1. Yet Another Attack on Vest Pascal, Delaunay, Antoine Joux
2. An Attribute-Based Broadcast Encryption Scheme, David Lubicz, Thomas Sirvent
3. Lower Bounds for Subset Cover Based Broadcast Encryption, Per Austrin, Gunnar Kreitz
4. Robust Threshold Schemes Based on the Chinese Remainder Theorem, Kamer Kaya, Ali Aydin Selcuk
5. An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees, Fabien Coelho
6. Improving integral attacks against Rijndael-256 up to 9 rounds, Samuel Galice, Marine Minier
7. Efficient Multiplication in F3m, Murat Cenk, Ferruh Ozbudak
8. Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers, Simon Fischer, Shahram Khazaei, Willi Meier
9. An Authentication Protocol with Encrypted Biometric Data, Julien Bringer, Herv´e Chabanne
10. Weaknesses in a Recent Ultralightweight RFID Authentication Protocol, Paolo D’Arco, Alfredo De Santis
11. A Proof of Security in O (2n) for the Benes Scheme, Jacques Patarin
12. Correlated Keystreams in MOUSTIQUE Tor, E. Bjorstad, Emilia Kasper, Christian Rechberger, Vincent Rijmen, Matt Robshaw, Gautham Sekar
13. Differential Cryptanalysis of PRESENT, Meiqin Wang
14. New Definition of Density on Knapsack Cryptosystems, Noboru Kunihiro
15. Cryptanalysis of the TRMS Cryptosystem of PKC’05 Luk Bettale, Jean-Charles Faug`ere, Ludovic Perret
16. Another generalization of Wiener’s attack on RSA, Abderrahmane Nitaj
17. Stream Ciphers using a Random Update Function : Study of the Entropy of the Inner State, Andrea R¨ock
18. On compressible pairings and their computation, Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe
19. Password Recovery on Challenge and Response : Impossible Differential Attack on Hash Function, Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
20. An Adaptation of the NICE Cryptosystem to Real Quadratic Orders, M. J. Jacobson, Jr, R. Scheidler, D. Weimer
21. Implementation of the AES-128 on Virtex-5 FPGAs P. Bulens, F.-X. Standaert, J.-J. Quisquater, P. Pellegrin, G. Rouvroy
22. Analysis of Grain‘s Initialization Algorithm, Christophe De Canniere, ¨Ozg¨ul K¨u¸c¨uk, Bart Preneel
23. Twisted Edwards Curves Daniel, J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters
24. Authenticated Encryption Mode for Beyond the Birthday Bound Security, Tetsu Iwata
25. How (Not) to Efficiently Dither Blockcipher-Based Hash Functions ?, Jean-Philippe Aumasson and Raphael C.-W. Phan

Welcome to Africa Crypt 2008

Africacrypt 2008 is a scientific conference that focuses on research in cryptology. It is organized by the Moroccan Association for Cryptography (AMC) in cooperation with the International Association for Cryptologic Research (IACR).

November 24, 2007 18:00 GMT Submission deadline
February 12, 2008 Notification of acceptance
March 13, 2008 Proceedings version due
March 15, 2008 Stipends deadline
May 15, 2008 Late registration deadline
JUNE 11-14, 2008 Conference

Professor Serge Vaudenay
Ecole Polytechnique Fédérale de Lausanne
Security and Cryptography Laboratory
Station 14 INF Building
CH-1015 Lausanne - Switzerland

Professor Abdelhak Azhari
Address: Mr A. AZHARI (President of the AMC)
Department of Mathematics and data-processing
B P. 50069 Casa - Gandhi Casablanca - MOROCCO
Fax: 00 - 212 - 022 - 98 - 53 - 26
Tel: 00 - 212 - 063 - 64 - 88 - 70
Email: aazhari@amcrypto.org

Last Updated: 2 July 2007