default search action
5th LATINCRYPT 2017: Havana, Cuba
- Tanja Lange, Orr Dunkelman:
Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11368, Springer 2019, ISBN 978-3-030-25282-3
Invited Talk
- Phillip Rogaway:
An Obsession with Definitions. 3-20
Security Protocols
- Elena Pagnin, Aikaterini Mitrokotsa, Keisuke Tanaka:
Anonymous Single-Round Server-Aided Verification. 23-43 - Colin Boyd, Britta Hale:
Secure Channels and Termination: The Last Word on TLS. 44-65 - Ela Lee:
Improved Security Notions for Proxy Re-Encryption to Enforce Access Control. 66-85
Public-Key Implementation
- Cristobal Leiva, Nicolas Thériault:
Optimal 2-3 Chains for Scalar Multiplication. 89-108 - Hayato Fujii, Diego F. Aranha:
Curve25519 for the Cortex-M4 and Beyond. 109-127 - Tobias Oder, Tim Güneysu:
Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs. 128-142
Cryptanalysis
- Haruhisa Kosuge, Hidema Tanaka:
Theoretical Security Evaluation Against Side-Channel Cube Attack with Key Enumeration. 145-165 - Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
On the Hardness of the Mersenne Low Hamming Ratio Assumption. 166-174 - Thom Wiggers:
Energy-Efficient ARM64 Cluster with Cryptanalytic Applications - 80 Cores That Do Not Cost You an ARM and a Leg. 175-188
Theory of Symmetric-Key Cryptography
- Reynier Antonio de la Cruz Jiménez:
Generation of 8-Bit S-Boxes Having Almost Optimal Cryptographic Properties Using Smaller 4-Bit S-Boxes and Finite Field Multiplication. 191-206 - Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi:
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. 207-227 - Yusuke Naito:
Improved XKX-Based AEAD Scheme: Removing the Birthday Terms. 228-246
Multiparty Computation and Privacy
- Filipp Valovich:
Aggregation of Time-Series Data Under Differential Privacy. 249-270 - Marcel Keller:
The Oblivious Machine - Or: How to Put the C into MPC. 271-288 - Aner Ben-Efraim, Eran Omri:
Concrete Efficiency Improvements for Multiparty Garbling with an Honest Majority. 289-308
New Constructions
- Gizem S. Çetin, Berk Sunar:
Homomorphic Rank Sort Using Surrogate Polynomials. 311-326 - Aggelos Kiayias, Giorgos Panagiotakos:
On Trees, Chains and Fast Transactions in the Blockchain. 327-351 - Dan Boneh, Rosario Gennaro, Steven Goldfeder:
Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security. 352-377
Adversarial Cryptography
- Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bülent Yener:
Environmental Authentication in Malware. 381-400 - George Teseleanu:
Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures. 401-414
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.