Progress in cryptology : AFRICACRYPT 2014 : 7th international conference on cryptology in Africa Marrakesh, Morocco, May 28-30, 2014 : proceedings

New Results for Rank-Based Cryptography.- Public-Key Cryptography.- Proxy Re-Encryption Scheme Supporting a Selection of Delegatees.- Trapdoor Privacy in Asymmetric Searchable Encryption Schemes.- Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited.- Hash Functions.- Differential Biases in Reduced-Round Keccak.- Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry.- Preimage Attacks on Reduced-Round Stribog.- Secret-Key Cryptanalysis.- Breaking the IOC Authenticated Encryption Mode.- New Treatment of the BSW Sampling and Its Applications to Stream Ciphers.- Multidimensional Zero-Correlation Linear Cryptanalysis of E2.- Public-Key Cryptanalysis and Number Theory Further Improvement of Factoring RSA Moduli with Implicit Hint.- New Attacks on the RSA Cryptosystem.- Formulae for Computation of Tate Pairing on Hyperelliptic Curve Using Hyperelliptic Nets.- Hardware Implementation.- New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers.- Minimizing S-Boxes in Hardware by Utilizing Linear Transformations.- Efficient Masked S-Boxes Processing - A Step Forward.- A More Efficient AES Threshold Implementation.- Protocols.- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum.- Position-Based Cryptography from Noisy Channels.- Lattice-Based Cryptography.- A Comparison of the Homomorphic Encryption Schemes FV and YASHE.- Towards Lattice Based Aggregate Signatures.- Public-Key Cryptography.- A Second Look at Fischlin's Transformation.- Anonymous IBE from Quadratic Residuosity with Improved Performance.- Expressive Attribute Based Signcryption with Constant-Size Ciphertext.- Secret-Key Cryptography.-DRECON: DPA Resistant Encryption by Construction.- Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions.- Universal Hash-Function Families: From Hashing to Authentication.