1 option
Progress in Cryptology - LATINCRYPT 2012 : 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings / edited by Alejandro Hevia, Gregory Neven.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024)- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 7533.
- Security and Cryptology ; 7533
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Computer security.
- Computer networks.
- Computer science--Mathematics.
- Computer science.
- Coding theory.
- Information theory.
- Optical data processing.
- Cryptology.
- Systems and Data Security.
- Computer Communication Networks.
- Discrete Mathematics in Computer Science.
- Coding and Information Theory.
- Computer Imaging, Vision, Pattern Recognition and Graphics.
- Local Subjects:
- Cryptology.
- Systems and Data Security.
- Computer Communication Networks.
- Discrete Mathematics in Computer Science.
- Coding and Information Theory.
- Computer Imaging, Vision, Pattern Recognition and Graphics.
- Physical Description:
- 1 online resource (XII, 323 pages) : 26 illustrations.
- Edition:
- First edition 2012.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
- System Details:
- text file PDF
- Summary:
- This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography.
- Contents:
- Indifferentiable Hashing to Barreto-Naehrig Curves
- Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves
- Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields
- Message-Based Traitor Tracing with Optimal Ciphertext Rate
- Leakage-Resilient Spatial Encryption
- On the Pseudorandom Function Assumption in (Secure) Distance- Bounding Protocols: PRF-ness alone Does Not Stop the Frauds!
- Lattice-Based Hierarchical Inner Product Encryption
- Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware
- The Security Impact of a New Cryptographic Library
- Faster Implementation of Scalar Multiplication on Koblitz Curves
- Zero-Knowledge for Multivariate Polynomials
- Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field
- UOWHFs from OWFs: Trading Regularity for Efficiency
- Random Mappings with Restricted Preimages
- On the Sosemanuk Related Key-IV Sets
- High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller
- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-642-33481-8
- 9783642334818
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.