![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
4. LATINCRYPT 2015: Guadalajara, Mexico
- Kristin E. Lauter, Francisco Rodríguez-Henríquez:
Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings. Lecture Notes in Computer Science 9230, Springer 2015, ISBN 978-3-319-22173-1
Cryptographic Protocols
- Eiichiro Fujisaki, Keita Xagawa
:
Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions. 3-20 - Vincenzo Iovino
, Karol Zebrowski:
Simulation-Based Secure Functional Encryption in the Random Oracle Model. 21-39 - Tung Chou
, Claudio Orlandi
:
The Simplest Protocol for Oblivious Transfer. 40-58
Foundations
- Gizem S. Çetin, Yarkin Doröz, Berk Sunar, Erkay Savas:
Depth Optimized Efficient Homomorphic Sorting. 61-80 - Krzysztof Pietrzak, Maciej Skorski
:
The Chain Rule for HILL Pseudoentropy, Revisited. 81-98
Post-Quantum Cryptography
- Thijs Laarhoven
, Benne de Weger:
Faster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive Hashing. 101-118 - Jean-François Biasse
, Luis Ruiz
:
FHEW with Efficient Multibit Bootstrapping. 119-135
Symmetric Key Cryptanalysis
- Itai Dinur, Orr Dunkelman
, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. 139-156 - Håvard Raddum
:
Algebraic Analysis of the Simon Block Cipher Family. 157-169 - Jorge Nakahara Jr.:
Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher. 170-186 - Ahmed Abdelkhalek, Riham AlTawy, Mohamed Tolba, Amr M. Youssef:
Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3. 187-203 - Ralph Ankele, Stefan Kölbl, Christian Rechberger:
State-Recovery Analysis of Spritz. 204-221
We Still Love Pairings
- Alex Capuñay Gonzales
, Nicolas Thériault:
Computing Optimal 2-3 Chains for Pairings. 225-244 - Paulo S. L. M. Barreto, Craig Costello
, Rafael Misoczki, Michael Naehrig, Geovandro C. C. F. Pereira, Gustavo H. M. Zanon:
Subgroup Security in Pairing-Based Cryptography. 245-265
Curves in Cryptography
- Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange:
Twisted Hessian Curves. 269-294 - Vanessa Vitse, Alexandre Wallet
:
Improved Sieving on Algebraic Curves. 295-307 - Jesús-Javier Chi-Domínguez, Thomaz Oliveira:
Attacking a Binary GLS Elliptic Curve with Magma. 308-326
Cryptographic Engineering
- Armando Faz-Hernández
, Julio López:
Fast Implementation of Curve25519 Using AVX2. 329-345 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu
:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers. 346-365 - Ana Karina D. S. de Oliveira, Julio López:
An Efficient Software Implementation of the Hash-Based Signature Scheme MSS and Its Variants. 366-383
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.