default search action
1. LATINCRYPT 2010: Puebla, Mexico
- Michel Abdalla, Paulo S. L. M. Barreto:
Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings. Lecture Notes in Computer Science 6212, Springer 2010, ISBN 978-3-642-14711-1
Encryption
- Kent D. Boklan, Alexander W. Dent, Christopher A. Seaman:
Broadcast Encryption with Multiple Trust Authorities. 1-19 - Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito:
Security of Sequential Multiple Encryption. 20-39 - Malika Izabachène, David Pointcheval, Damien Vergnaud:
Mediated Traceable Anonymous Encryption. 40-60
Elliptic Curves
- Daniel J. Bernstein, Peter Birkner, Tanja Lange:
Starfish on Strike. 61-80 - Pierre-Alain Fouque, Mehdi Tibouchi:
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. 81-91
Implementation of Pairings
- Craig Costello, Douglas Stebila:
Fixed Argument Pairings. 92-108 - Michael Naehrig, Ruben Niederhagen, Peter Schwabe:
New Software Speed Records for Cryptographic Pairings. 109-123
Implementation of Cryptographic Algorithms
- Jérémie Detrey, Guillaume Hanrot, Xavier Pujol, Damien Stehlé:
Accelerating Lattice Reduction with FPGAs. 124-143 - Diego F. Aranha, Julio López, Darrel Hankerson:
Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets. 144-161
Cryptographic Protocols and Foundations
- Arpita Patra, C. Pandu Rangan:
Communication Optimal Multi-valued Asynchronous Broadcast Protocol. 162-177 - Philippe Camacho, Alejandro Hevia:
On the Impossibility of Batch Update for Cryptographic Accumulators. 178-188 - S. Dov Gordon, Hoeteck Wee, David Xiao, Arkady Yerukhimovich:
On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations. 189-204
Cryptanalysis of Symmetric Primitives
- Çagdas Çalik, Meltem Sönmez Turan:
Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256. 205-221 - Valérie Nachef, Jacques Patarin, Joana Treger:
Generic Attacks on Misty Schemes. 222-240
Post-Quantum Cryptography
- Jean-Charles Faugère, Antoine Joux, Ludovic Perret, Joana Treger:
Cryptanalysis of the Hidden Matrix Cryptosystem. 241-254 - Pierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva:
A Lattice-Based Threshold Ring Signature Scheme. 255-272
Side-Channel Attacks
- Sylvain Guilley, Laurent Sauvage, Julien Micolod, Denis Réal, Frédéric Valette:
Defeating Any Secret Cryptography with SCARE Attacks. 273-293 - François-Xavier Standaert:
How Leaky Is an Extractor? 294-304 - Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David F. Oswald:
Combined Implementation Attack Resistant Exponentiation. 305-322
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.