Progress in Cryptology - LATINCRYPT 2010 First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings /

This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010. The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 su...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
مؤلف مشترك: SpringerLink (Online service)
مؤلفون آخرون: Abdalla, Michel. (المحرر, http://id.loc.gov/vocabulary/relators/edt), Barreto, Paulo S.L.M. (المحرر, http://id.loc.gov/vocabulary/relators/edt)
التنسيق: الكتروني كتاب الكتروني
اللغة:English
منشور في: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
الطبعة:1st ed. 2010.
سلاسل:Security and Cryptology ; 6212
الموضوعات:
الوصول للمادة أونلاين:https://doi.org/10.1007/978-3-642-14712-8
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
جدول المحتويات:
  • Encryption
  • Broadcast Encryption with Multiple Trust Authorities
  • Security of Sequential Multiple Encryption
  • Mediated Traceable Anonymous Encryption
  • Elliptic Curves
  • Starfish on Strike
  • Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
  • Implementation of Pairings
  • Fixed Argument Pairings
  • New Software Speed Records for Cryptographic Pairings
  • Implementation of Cryptographic Algorithms
  • Accelerating Lattice Reduction with FPGAs
  • Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets
  • Cryptographic Protocols and Foundations
  • Communication Optimal Multi-valued Asynchronous Broadcast Protocol
  • On the Impossibility of Batch Update for Cryptographic Accumulators
  • On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations
  • Cryptanalysis of Symmetric Primitives
  • Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256
  • Generic Attacks on Misty Schemes
  • Post-Quantum Cryptography
  • Cryptanalysis of the Hidden Matrix Cryptosystem
  • A Lattice-Based Threshold Ring Signature Scheme
  • Side-Channel Attacks
  • Defeating Any Secret Cryptography with SCARE Attacks
  • How Leaky Is an Extractor?
  • Combined Implementation Attack Resistant Exponentiation.