|
|
|
|
LEADER |
03402nmm a2200457 u 4500 |
001 |
EB000390366 |
003 |
EBX01000000000000000243419 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783642334818
|
100 |
1 |
|
|a Hevia, Alejandro
|e [editor]
|
245 |
0 |
0 |
|a Progress in Cryptology – LATINCRYPT 2012
|h Elektronische Ressource
|b 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings
|c edited by Alejandro Hevia, Gregory Neven
|
250 |
|
|
|a 1st ed. 2012
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2012, 2012
|
300 |
|
|
|a XII, 323 p. 26 illus
|b online resource
|
505 |
0 |
|
|a Indifferentiable Hashing to Barreto–Naehrig Curves -- Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves -- Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields -- Message-Based Traitor Tracing with Optimal Ciphertext Rate -- Leakage-Resilient Spatial Encryption -- On the Pseudorandom Function Assumption in (Secure) Distance- Bounding Protocols: PRF-ness alone Does Not Stop the Frauds! -- Lattice-Based Hierarchical Inner Product Encryption -- Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware -- The Security Impact of a New Cryptographic Library -- Faster Implementation of Scalar Multiplication on Koblitz Curves -- Zero-Knowledge for Multivariate Polynomials -- Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field -- UOWHFs from OWFs: Trading Regularity for Efficiency -- Random Mappings with Restricted Preimages -- On the Sosemanuk Related Key-IV Sets -- High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller -- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Coding and Information Theory
|
653 |
|
|
|a Coding theory
|
653 |
|
|
|a Image processing / Digital techniques
|
653 |
|
|
|a Computer science / Mathematics
|
653 |
|
|
|a Computer vision
|
653 |
|
|
|a Discrete Mathematics in Computer Science
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Computer Imaging, Vision, Pattern Recognition and Graphics
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Discrete mathematics
|
653 |
|
|
|a Data and Information Security
|
700 |
1 |
|
|a Neven, Gregory
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-642-33481-8
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-33481-8?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.824
|
520 |
|
|
|a This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography
|