Description |
1 online resource |
Series |
Lecture notes in computer science ; 7533 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7533.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Indifferentiable Hashing to Barreto-Naehrig Curves / Pierre-Alain Fouque and Mehdi Tibouchi -- Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves / Sihem Mesnager -- Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields / Rodrigo Abarzúa and Nicolas Thériault -- Message-Based Traitor Tracing with Optimal Ciphertext Rate / Duong Hieu Phan, David Pointcheval and Mario Strefler -- Leakage-Resilient Spatial Encryption / Michel Abdalla and Jill-Jênn Vie -- On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols / PRF-ness alone Does Not Stop the Frauds! / Ioana Boureanu, Aikaterini Mitrokotsa and Serge Vaudenay -- Lattice-Based Hierarchical Inner Product Encryption / Michel Abdalla, Angelo De Caro and Karina Mochetti -- Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware / Thomas Pöppelmann and Tim Güneysu -- The Security Impact of a New Cryptographic Library / Daniel J. Bernstein, Tanja Lange and Peter Schwabe |
|
Faster Implementation of Scalar Multiplication on Koblitz Curves / Diego F. Aranha, Armando Faz-Hernández, Julio López and Francisco Rodríguez-Henríquez -- Zero-Knowledge for Multivariate Polynomials / Valérie Nachef, Jacques Patarin and Emmanuel Volte -- Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field / Vanessa Dixon, Michael J. Jacobson Jr. and Renate Scheidler -- UOWHFs from OWFs: Trading Regularity for Efficiency / Kfir Barhum and Ueli Maurer -- Random Mappings with Restricted Preimages / Andrew MacFie and Daniel Panario -- On the Sosemanuk Related Key-IV Sets / Aleksandar Kircanski and Amr M. Youssef -- High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller / Conrado P.L. Gouvêa and Julio López -- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output / Benedikt Gierlichs, Jörn-Marc Schmidt and Michael Tunstall |
Summary |
This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography |
Bibliography |
Includes bibliographical references and author index |
Notes |
Print version record |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Informatique.
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Hevia, Alejandro.
|
|
Neven, Gregory.
|
ISBN |
9783642334818 |
|
3642334814 |
|