Cargando…

Progress in Cryptology - LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings /

This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully r...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Hevia, Alejandro (Editor ), Neven, Gregory (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Edición:1st ed. 2012.
Colección:Security and Cryptology ; 7533
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Indifferentiable Hashing to Barreto-Naehrig Curves
  • Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves
  • Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields
  • Message-Based Traitor Tracing with Optimal Ciphertext Rate
  • Leakage-Resilient Spatial Encryption
  • On the Pseudorandom Function Assumption in (Secure) Distance- Bounding Protocols: PRF-ness alone Does Not Stop the Frauds!
  • Lattice-Based Hierarchical Inner Product Encryption
  • Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware
  • The Security Impact of a New Cryptographic Library
  • Faster Implementation of Scalar Multiplication on Koblitz Curves
  • Zero-Knowledge for Multivariate Polynomials
  • Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field
  • UOWHFs from OWFs: Trading Regularity for Efficiency
  • Random Mappings with Restricted Preimages
  • On the Sosemanuk Related Key-IV Sets
  • High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller
  • Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output.