Cargando…

Progress in Cryptology - LATINCRYPT 2010 First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings /

This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010. The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 su...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Abdalla, Michel (Editor ), Barreto, Paulo S.L.M (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6212
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Encryption
  • Broadcast Encryption with Multiple Trust Authorities
  • Security of Sequential Multiple Encryption
  • Mediated Traceable Anonymous Encryption
  • Elliptic Curves
  • Starfish on Strike
  • Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
  • Implementation of Pairings
  • Fixed Argument Pairings
  • New Software Speed Records for Cryptographic Pairings
  • Implementation of Cryptographic Algorithms
  • Accelerating Lattice Reduction with FPGAs
  • Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets
  • Cryptographic Protocols and Foundations
  • Communication Optimal Multi-valued Asynchronous Broadcast Protocol
  • On the Impossibility of Batch Update for Cryptographic Accumulators
  • On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations
  • Cryptanalysis of Symmetric Primitives
  • Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256
  • Generic Attacks on Misty Schemes
  • Post-Quantum Cryptography
  • Cryptanalysis of the Hidden Matrix Cryptosystem
  • A Lattice-Based Threshold Ring Signature Scheme
  • Side-Channel Attacks
  • Defeating Any Secret Cryptography with SCARE Attacks
  • How Leaky Is an Extractor?
  • Combined Implementation Attack Resistant Exponentiation.