Progress in Cryptology - LATINCRYPT 2012 : 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings

This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully r...

Celý popis

Uloženo v:
Podrobná bibliografie
Další autoři: Hevia, Alejandro (Editor)
Neven, Gregory (Editor)
Korporace: SpringerLink (online služba)  
Médium: E-kniha
Jazyk:angličtina
Vydáno: Berlin ; Heidelberg : Springer Berlin Heidelberg, 2012
Edice:Lecture Notes in Computer Science
Žánr/forma:elektronické knihy
ISBN:978-3-642-33481-8
9783642334801
Témata:
On-line přístup:Plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
Obálka
Obsah:
  • Indifferentiable Hashing to Barreto-Naehrig Curves
  • Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves
  • Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields
  • Message-Based Traitor Tracing with Optimal Ciphertext Rate
  • Leakage-Resilient Spatial Encryption
  • On the Pseudorandom Function Assumption in (Secure) Distance- Bounding Protocols: PRF-ness alone Does Not Stop the Frauds!
  • Lattice-Based Hierarchical Inner Product Encryption
  • Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware
  • The Security Impact of a New Cryptographic Library
  • Faster Implementation of Scalar Multiplication on Koblitz Curves
  • Zero-Knowledge for Multivariate Polynomials
  • Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field
  • UOWHFs from OWFs: Trading Regularity for Efficiency
  • Random Mappings with Restricted Preimages
  • On the Sosemanuk Related Key-IV Sets
  • High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller
  • Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output