default search action
2. LATINCRYPT 2012: Santiago, Chile
- Alejandro Hevia, Gregory Neven:
Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings. Lecture Notes in Computer Science 7533, Springer 2012, ISBN 978-3-642-33480-1
Elliptic Curves
- Pierre-Alain Fouque, Mehdi Tibouchi:
Indifferentiable Hashing to Barreto-Naehrig Curves. 1-17 - Sihem Mesnager:
Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves. 18-36 - Rodrigo Abarzúa, Nicolas Thériault:
Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields. 37-55
Cryptographic Protocols I
- Duong Hieu Phan, David Pointcheval, Mario Strefler:
Message-Based Traitor Tracing with Optimal Ciphertext Rate. 56-77 - Michel Abdalla, Jill-Jênn Vie:
Leakage-Resilient Spatial Encryption. 78-99 - Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols - PRF-ness alone Does Not Stop the Frauds! 100-120 - Michel Abdalla, Angelo De Caro, Karina Mochetti:
Lattice-Based Hierarchical Inner Product Encryption. 121-138
Implementations
- Thomas Pöppelmann, Tim Güneysu:
Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware. 139-158 - Daniel J. Bernstein, Tanja Lange, Peter Schwabe:
The Security Impact of a New Cryptographic Library. 159-176 - Diego F. Aranha, Armando Faz-Hernández, Julio López, Francisco Rodríguez-Henríquez:
Faster Implementation of Scalar Multiplication on Koblitz Curves. 177-193
Cryptographic protocols II
- Valérie Nachef, Jacques Patarin, Emmanuel Volte:
Zero-Knowledge for Multivariate Polynomials. 194-213 - Vanessa Dixon, Michael J. Jacobson Jr., Renate Scheidler:
Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field. 214-233
Foundations
- Kfir Barhum, Ueli Maurer:
UOWHFs from OWFs: Trading Regularity for Efficiency. 234-253 - Andrew MacFie, Daniel Panario:
Random Mappings with Restricted Preimages. 254-270
Symmetric-key Cryptography
- Aleksandar Kircanski, Amr M. Youssef:
On the Sosemanuk Related Key-IV Sets. 271-287 - Conrado Porto Lopes Gouvêa, Julio López:
High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller. 288-304 - Benedikt Gierlichs, Jörn-Marc Schmidt, Michael Tunstall:
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. 305-321
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.