AFRICACRYPT 2010, May 03-06, 2010, Stellenbosch, South Africa

After two successful Africacrypts (Africacrypt 2009 in Gammarth, Tunisia and Africacrypt 2008 in Casablanca, Morocco), Africacrypt 2010 will take place in Stellenbosch, South Africa. For more information, such as program, registration, practical matters see:

Call for papers:

The conference seeks original contributions in cryptology: We welcome submissions about new cryptographic primitive proposals, cryptanalysis, security models, hardware and software implementation aspects, cryptographic protocols and applications. We also consider submissions about cryptographic aspects of network security, complexity theory, information theory, coding theory, number theory, and quantum computing.
The proceedings of Africacrypt 2010 will be published by Springer Verlag as Volume 6055 in the Lecture Notes in Computer Science (LNCS) series. The proceedings will be available during the conference.

Important deadlines and dates (revised):

January 05, 2010: registration of paper (title, abstract)
January 10, 2010: submission deadline
February 19, 2010: notification of acceptance or rejection
February 28, 2010: revised version of accepted papers due
May 03-06, 2010: Africacrypt 2010
No new submissions will be accepted after the submission of abstracts deadline (Jan 05); it is still possible to modify the submissions until Jan 10.

Instructions for Authors of Papers

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for the purpose of detecting duplication. Accepted submissions may not appear in any other conference or workshop with proceedings.
Submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. Each submission should begin with a title, a short abstract, and a list of keywords, and an introduction that summarizes the contributions of the paper at a level appropriate for a non-specialist reader. Submissions not meeting these guidelines risk rejection without consideration of their merits.
The page limit for submissions is 18 pages in LNCS format (see including references and appendices. Up to 12 pages of additional supporting information may be provided, but committee members will read this information at their discretion, so the paper should be intelligible and self-contained within the 18 page LNCS limit. The final versions of accepted papers will be limited to 18 pages including references and appendices.
Papers must be submitted electronically. A detailed description of the electronic submission procedure is available at
Submissions must conform to this procedure. Late submissions and non-electronic submissions will not be considered. No new submissions will be accepted after the submission of abstracts deadline (Jan 05); it is still possible to modify the submissions until Jan 10. Authors of accepted papers must guarantee that their paper will be presented at the conference.
Accepted papers will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers.

Program Committee

Michel Abdalla, Ecole Normale Superieure, France
Roberto Avanzi, Ruhr-University Bochum, Germany
Hatem M. Bahig, Ain Shams University, Egypt
Paulo S. L. M. Barreto, University of São Paulo, Brazil
Lejla Batina, Radboud University Nijmegen and KU Leuven, Netherlands and Belgium
Daniel J. Bernstein, University of Illinois at Chicago, USA
Ashraf M. Bhery, Ain Shams University, Egypt
Peter Birkner, Université de Versailles Saint-Quentin-en-Yvelines, France
Colin Boyd, Queensland University of Technology, Australia
Xavier Boyen, University of Liege, Belgium
Johannes Buchmann, TU Darmstadt, Germany
Christophe De Cannière, Katholieke Universiteit Leuven, Belgium
Chen-Mou Cheng, National Taiwan University, Taiwan
Carlos Cid, Royal Holloway, University of London, UK
Alexander W. Dent, Royal Holloway, University of London, UK
Yvo Desmedt, University College London, UK and RCIS, AIST, Japan
Christophe Doche, Macquarie University, Australia
Orr Dunkelman, Weizmann Institute, Israel
Matthieu Finiasz, ENSTA, France
Shay Gueron, University of Haifa and Intel Corporation, Israel
Tim Güneysu, Ruhr-University Bochum, Germany
Helena Handschuh, Katholieke Universiteit Leuven, Belgium and Intrinsic-ID, USA
Antoine Joux, DGA and University of Versailles Saint-Quentin-en-Yvelines, France
Marc Joye, Technicolor, France
Tanja Lange, Technische Universiteit Eindhoven, Netherlands
Keith Martin, Royal Holloway, University of London, UK
Mitsuru Matsui, Mitsubishi Electric, Japan
David McGrew, Cisco, USA
Alfred Menezes, University of Waterloo, Canada
Michele Mosca, University of Waterloo, Canada
Michael Naehrig, Microsoft Research, USA
Abderrahmane Nitaj, Université de Caen, France
Elisabeth Oswald, University of Bristol, UK
Christof Paar, Ruhr-University Bochum, Germany
Daniel Page, University of Bristol, UK
Josef Pieprzyk, Macquarie University, Australia
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Christian Rechberger, Katholieke Universiteit Leuven, Belgium
Magdy Saeb, Arab Academy for Science, Technology & Maritime Transport, Egypt
Palash Sarkar, Indian Statistical Institute, India
Berry Schoenmakers, Technische Universiteit Eindhoven, Netherlands
Michael Scott, Dublin City University, Ireland
Nicolas Sendrier, INRIA, France
Francesco Sica, University of Calgary, Canada
Martijn Stam, EPFL, Switzerland
François-Xavier Standaert, Universite catholique de Louvain, Belgium
Damien Stehlé, CNRS/University of Sydney/Macquarie University, France/Australia/Australia
Christine Swart, University of Cape Town, South Africa
Mike Szydlo, Akamai, USA
Brent Waters, University of Texas at Austin, USA
Michael J. Wiener, Cryptographic Clarity, Canada
Bo-Yin Yang, Academia Sinica, Taiwan
Amr M. Youssef, Concordia University, Canada
Paul Zimmermann, INRIA Nancy - Grand Est, France

Conference chairs:

Program Chairs:
Daniel J. Bernstein
University of Illinois at Chicago

Tanja Lange
Technische Universiteit Eindhoven

General chairs:
Riaal Domingues
South African Communications and Security Agency
South Africa

Dr. Christine Swart
University of Cape Town
South Africa

Accepted papers


A New RSA-Based Signature Scheme
Sven Schäge, Jörg Schwenk

Fair Blind Signatures without Random Oracles
Georg Fuchsbauer, Damien Vergnaud

Fair Partially Blind Signatures
Markus Rückert, Dominique Schröder


Parallel Shortest Lattice Vector Enumeration on Graphics Cards
Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, Bart Preneel

Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2
Johannes Buchmann, Daniel Cabarcas, Jintai Ding, Mohamed Saied Emam Mohamed

Factoring RSA Modulus using Prime Reconstruction from Random Known Bits
Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta


Proofs of Restricted Shuffles
Björn Terelius, Douglas Wikström

Batch Range Proof For Practical Small Ranges
Kun Peng, Feng Bao

Optimistic Fair Priced Oblivious Transfer
Alfredo Rial, Bart Preneel


Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsutomu Matsumoto

Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes
Yvo Desmedt, Stelios Erotokritou, Reihaneh Safavi-Naini

Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
Arpita Patra, Ashish Choudhury, C. Pandu Rangan

Elliptic curves

Avoiding Full Extension Field Arithmetic in Pairing Computations
Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong

ECC2K-130 on Cell CPUs
Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe

Side-channel attacks and fault attacks

Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
M. Abdelaziz Elaabid, Sylvain Guilley

Differential Fault Analysis of HC-128
Aleksandar Kircanski, Amr M. Youssef

Fresh Re-Keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
Marcel Medwed, François-Xavier Standaert, Johann Großschädl, Francesco Regazzoni

Public-key encryption

Strong Cryptography from Weak Secrets: Building Efficient PKE and IBE from Distributed Passwords
Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, David Pointcheval

Efficient Unidirectional Proxy Re-Encryption
Sherman S.M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder

Keys and PUFs

Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Michel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval

Quantum readout of Physical Unclonable Functions
Boris Škorić

Ciphers and hash functions

Parallelizing the Camellia and SMS4 Block Ciphers
Huihui Yap, Khoongming Khoo, Axel Poschmann

Improved Linear Differential Attacks on CubeHash
Shahram Khazaei, Simon Knellwolf, Willi Meier, Deian Stefan

Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer


CIMPA (International Centre for Pure and Applied Mathematics) is a non-profit international organization established in Nice (France) in 1978. Its aim is to promote international cooperation in higher education and research in mathematics and related subjects, particularly computer science, for the benefit of developing countries.
Prism, a subsidiary of NET1 UEPS Technologies, Inc., is a Trusted Transactions company that develops innovative payment-centric products, solutions and services that enable and process secure electronic transactions. Prism operates mainly within the telecommunications, banking, retail, petroleum and utilities sectors.
NET1 provides chip card technologies and systems such as its Universal Electronic Payment System (UEPS) to establish a secure and affordable transacting channel between formal businesses and the un-banked and under-banked populations of developing economies.