Cargando…

Progress in Cryptology - LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings /

This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully r...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Hevia, Alejandro (Editor ), Neven, Gregory (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Edición:1st ed. 2012.
Colección:Security and Cryptology ; 7533
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-33481-8
003 DE-He213
005 20220112151900.0
007 cr nn 008mamaa
008 120822s2012 gw | s |||| 0|eng d
020 |a 9783642334818  |9 978-3-642-33481-8 
024 7 |a 10.1007/978-3-642-33481-8  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Progress in Cryptology - LATINCRYPT 2012  |h [electronic resource] :  |b 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings /  |c edited by Alejandro Hevia, Gregory Neven. 
250 |a 1st ed. 2012. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2012. 
300 |a XII, 323 p. 26 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 7533 
505 0 |a Indifferentiable Hashing to Barreto-Naehrig Curves -- Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves -- Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields -- Message-Based Traitor Tracing with Optimal Ciphertext Rate -- Leakage-Resilient Spatial Encryption -- On the Pseudorandom Function Assumption in (Secure) Distance- Bounding Protocols: PRF-ness alone Does Not Stop the Frauds! -- Lattice-Based Hierarchical Inner Product Encryption -- Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware -- The Security Impact of a New Cryptographic Library -- Faster Implementation of Scalar Multiplication on Koblitz Curves -- Zero-Knowledge for Multivariate Polynomials -- Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field -- UOWHFs from OWFs: Trading Regularity for Efficiency -- Random Mappings with Restricted Preimages -- On the Sosemanuk Related Key-IV Sets -- High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller -- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. 
520 |a This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data protection. 
650 0 |a Computer networks . 
650 0 |a Computer science-Mathematics. 
650 0 |a Discrete mathematics. 
650 0 |a Coding theory. 
650 0 |a Information theory. 
650 0 |a Image processing-Digital techniques. 
650 0 |a Computer vision. 
650 1 4 |a Cryptology. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Discrete Mathematics in Computer Science. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a Computer Imaging, Vision, Pattern Recognition and Graphics. 
700 1 |a Hevia, Alejandro.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Neven, Gregory.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642334825 
776 0 8 |i Printed edition:  |z 9783642334801 
830 0 |a Security and Cryptology ;  |v 7533 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-33481-8  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)