Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings /

This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully r...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Hevia, Alejandro (Επιμελητής έκδοσης), Neven, Gregory (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Σειρά:Lecture Notes in Computer Science, 7533
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Indifferentiable Hashing to Barreto–Naehrig Curves
  • Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves
  • Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields
  • Message-Based Traitor Tracing with Optimal Ciphertext Rate
  • Leakage-Resilient Spatial Encryption
  • On the Pseudorandom Function Assumption in (Secure) Distance- Bounding Protocols: PRF-ness alone Does Not Stop the Frauds!
  • Lattice-Based Hierarchical Inner Product Encryption
  • Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware
  • The Security Impact of a New Cryptographic Library
  • Faster Implementation of Scalar Multiplication on Koblitz Curves
  • Zero-Knowledge for Multivariate Polynomials
  • Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field
  • UOWHFs from OWFs: Trading Regularity for Efficiency
  • Random Mappings with Restricted Preimages
  • On the Sosemanuk Related Key-IV Sets
  • High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller
  • Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output.