Progress in Cryptology - LATINCRYPT 2010 First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings /

This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010. The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 su...

תיאור מלא

שמור ב:
מידע ביבליוגרפי
מחבר תאגידי: SpringerLink (Online service)
מחברים אחרים: Abdalla, Michel. (Editor, http://id.loc.gov/vocabulary/relators/edt), Barreto, Paulo S.L.M. (Editor, http://id.loc.gov/vocabulary/relators/edt)
פורמט: אלקטרוני ספר אלקטרוני
שפה:English
יצא לאור: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
מהדורה:1st ed. 2010.
סדרה:Security and Cryptology ; 6212
נושאים:
גישה מקוונת:https://doi.org/10.1007/978-3-642-14712-8
תגים: הוספת תג
אין תגיות, היה/י הראשונ/ה לתייג את הרשומה!
תוכן הענינים:
  • Encryption
  • Broadcast Encryption with Multiple Trust Authorities
  • Security of Sequential Multiple Encryption
  • Mediated Traceable Anonymous Encryption
  • Elliptic Curves
  • Starfish on Strike
  • Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
  • Implementation of Pairings
  • Fixed Argument Pairings
  • New Software Speed Records for Cryptographic Pairings
  • Implementation of Cryptographic Algorithms
  • Accelerating Lattice Reduction with FPGAs
  • Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets
  • Cryptographic Protocols and Foundations
  • Communication Optimal Multi-valued Asynchronous Broadcast Protocol
  • On the Impossibility of Batch Update for Cryptographic Accumulators
  • On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations
  • Cryptanalysis of Symmetric Primitives
  • Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256
  • Generic Attacks on Misty Schemes
  • Post-Quantum Cryptography
  • Cryptanalysis of the Hidden Matrix Cryptosystem
  • A Lattice-Based Threshold Ring Signature Scheme
  • Side-Channel Attacks
  • Defeating Any Secret Cryptography with SCARE Attacks
  • How Leaky Is an Extractor?
  • Combined Implementation Attack Resistant Exponentiation.