Progress in Cryptology – LATINCRYPT 2012 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings

This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully r...

Full description

Bibliographic Details
Other Authors: Hevia, Alejandro (Editor), Neven, Gregory (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2012, 2012
Edition:1st ed. 2012
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03402nmm a2200457 u 4500
001 EB000390366
003 EBX01000000000000000243419
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783642334818 
100 1 |a Hevia, Alejandro  |e [editor] 
245 0 0 |a Progress in Cryptology – LATINCRYPT 2012  |h Elektronische Ressource  |b 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings  |c edited by Alejandro Hevia, Gregory Neven 
250 |a 1st ed. 2012 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2012, 2012 
300 |a XII, 323 p. 26 illus  |b online resource 
505 0 |a Indifferentiable Hashing to Barreto–Naehrig Curves -- Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves -- Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields -- Message-Based Traitor Tracing with Optimal Ciphertext Rate -- Leakage-Resilient Spatial Encryption -- On the Pseudorandom Function Assumption in (Secure) Distance- Bounding Protocols: PRF-ness alone Does Not Stop the Frauds! -- Lattice-Based Hierarchical Inner Product Encryption -- Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware -- The Security Impact of a New Cryptographic Library -- Faster Implementation of Scalar Multiplication on Koblitz Curves -- Zero-Knowledge for Multivariate Polynomials -- Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field -- UOWHFs from OWFs: Trading Regularity for Efficiency -- Random Mappings with Restricted Preimages -- On the Sosemanuk Related Key-IV Sets -- High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller -- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output 
653 |a Computer Communication Networks 
653 |a Coding and Information Theory 
653 |a Coding theory 
653 |a Image processing / Digital techniques 
653 |a Computer science / Mathematics 
653 |a Computer vision 
653 |a Discrete Mathematics in Computer Science 
653 |a Cryptography 
653 |a Computer networks  
653 |a Computer Imaging, Vision, Pattern Recognition and Graphics 
653 |a Information theory 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Discrete mathematics 
653 |a Data and Information Security 
700 1 |a Neven, Gregory  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-642-33481-8 
856 4 0 |u https://doi.org/10.1007/978-3-642-33481-8?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824 
520 |a This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography