Progress in Cryptology - LATINCRYPT 2010 First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings /
This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010. The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 su...
        Αποθηκεύτηκε σε:
      
    
                  | Συγγραφή απο Οργανισμό/Αρχή: | |
|---|---|
| Άλλοι συγγραφείς: | , | 
| Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο | 
| Γλώσσα: | English | 
| Έκδοση: | Berlin, Heidelberg :
        Springer Berlin Heidelberg : Imprint: Springer,
    
      2010. | 
| Έκδοση: | 1st ed. 2010. | 
| Σειρά: | Security and Cryptology ;
              6212 | 
| Θέματα: | |
| Διαθέσιμο Online: | https://doi.org/10.1007/978-3-642-14712-8 | 
| Ετικέτες: | Προσθήκη ετικέτας 
      Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
   | 
                Πίνακας περιεχομένων: 
            
                  - Encryption
- Broadcast Encryption with Multiple Trust Authorities
- Security of Sequential Multiple Encryption
- Mediated Traceable Anonymous Encryption
- Elliptic Curves
- Starfish on Strike
- Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
- Implementation of Pairings
- Fixed Argument Pairings
- New Software Speed Records for Cryptographic Pairings
- Implementation of Cryptographic Algorithms
- Accelerating Lattice Reduction with FPGAs
- Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets
- Cryptographic Protocols and Foundations
- Communication Optimal Multi-valued Asynchronous Broadcast Protocol
- On the Impossibility of Batch Update for Cryptographic Accumulators
- On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations
- Cryptanalysis of Symmetric Primitives
- Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256
- Generic Attacks on Misty Schemes
- Post-Quantum Cryptography
- Cryptanalysis of the Hidden Matrix Cryptosystem
- A Lattice-Based Threshold Ring Signature Scheme
- Side-Channel Attacks
- Defeating Any Secret Cryptography with SCARE Attacks
- How Leaky Is an Extractor?
- Combined Implementation Attack Resistant Exponentiation.



