Progress in Cryptology – LATINCRYPT 2010 [recurso electrónico] : First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings / edited by Michel Abdalla, Paulo S. L. M. Barreto.

Por: Abdalla, Michel [editor.]Colaborador(es): Barreto, Paulo S. L. M [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 6212Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Descripción: XII, 323p. 47 illus. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642147128Tema(s): Computer science | Data encryption (Computer science) | Computer Science | Data EncryptionFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.82 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónicoTexto
Contenidos:
Encryption -- Broadcast Encryption with Multiple Trust Authorities -- Security of Sequential Multiple Encryption -- Mediated Traceable Anonymous Encryption -- Elliptic Curves -- Starfish on Strike -- Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves -- Implementation of Pairings -- Fixed Argument Pairings -- New Software Speed Records for Cryptographic Pairings -- Implementation of Cryptographic Algorithms -- Accelerating Lattice Reduction with FPGAs -- Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets -- Cryptographic Protocols and Foundations -- Communication Optimal Multi-valued Asynchronous Broadcast Protocol -- On the Impossibility of Batch Update for Cryptographic Accumulators -- On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations -- Cryptanalysis of Symmetric Primitives -- Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256 -- Generic Attacks on Misty Schemes -- Post-Quantum Cryptography -- Cryptanalysis of the Hidden Matrix Cryptosystem -- A Lattice-Based Threshold Ring Signature Scheme -- Side-Channel Attacks -- Defeating Any Secret Cryptography with SCARE Attacks -- How Leaky Is an Extractor? -- Combined Implementation Attack Resistant Exponentiation.
En: Springer eBooksResumen: LATINCRYPT 2010 was the First International Conference on Cryptology and Information Security in Latin America and took place during August 8–11, 2010 in Puebla, Mexico. LATINCRYPT 2010 was organized by the Centro de Investigaci´ on y de Estudios Avanzados del IPN (CINVESTAV-IPN) and the Benem´ erita Universidad Aut´ onoma de Puebla (BUAP) in cooperation with The International Association for Cryptologic Research (IACR). The General Chair of the conference was Francisco Rodr´ ?guez Henr´ ?quez. The conference received 62 submissions and each submission was assigned to at least three committee members. Submissions co-authored by members of the ProgramCommittee were assigned to at least ?ve committee members. The reviewing process was challenging due to the large number of high-quality s- missions, and we are deeply grateful to the committee members and external - viewers for their outstanding work. After meticulous deliberation, the Program Committee, which was chaired by Michel Abdalla and Paulo S. L. M. Barreto, selected 19 submissions for presentationat the conference. These are the articles included in this volume. In addition to these presentations, the program also included four invited talks. The reviewing process was run using the iChair software,written by Thomas Baign` eresfromCryptoExperts,FranceandMatthieuFiniaszfromEPFL,LASEC, Switzerland. We are grateful to them for letting us use their software and to ´ JacquesBeigbederfromtheEcoleNormaleSup´ erieureforhelping withthe setup of the reviewing website.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos QA76.9 .A25 (Browse shelf(Abre debajo)) 1 No para préstamo 374836-2001

Encryption -- Broadcast Encryption with Multiple Trust Authorities -- Security of Sequential Multiple Encryption -- Mediated Traceable Anonymous Encryption -- Elliptic Curves -- Starfish on Strike -- Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves -- Implementation of Pairings -- Fixed Argument Pairings -- New Software Speed Records for Cryptographic Pairings -- Implementation of Cryptographic Algorithms -- Accelerating Lattice Reduction with FPGAs -- Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets -- Cryptographic Protocols and Foundations -- Communication Optimal Multi-valued Asynchronous Broadcast Protocol -- On the Impossibility of Batch Update for Cryptographic Accumulators -- On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations -- Cryptanalysis of Symmetric Primitives -- Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256 -- Generic Attacks on Misty Schemes -- Post-Quantum Cryptography -- Cryptanalysis of the Hidden Matrix Cryptosystem -- A Lattice-Based Threshold Ring Signature Scheme -- Side-Channel Attacks -- Defeating Any Secret Cryptography with SCARE Attacks -- How Leaky Is an Extractor? -- Combined Implementation Attack Resistant Exponentiation.

LATINCRYPT 2010 was the First International Conference on Cryptology and Information Security in Latin America and took place during August 8–11, 2010 in Puebla, Mexico. LATINCRYPT 2010 was organized by the Centro de Investigaci´ on y de Estudios Avanzados del IPN (CINVESTAV-IPN) and the Benem´ erita Universidad Aut´ onoma de Puebla (BUAP) in cooperation with The International Association for Cryptologic Research (IACR). The General Chair of the conference was Francisco Rodr´ ?guez Henr´ ?quez. The conference received 62 submissions and each submission was assigned to at least three committee members. Submissions co-authored by members of the ProgramCommittee were assigned to at least ?ve committee members. The reviewing process was challenging due to the large number of high-quality s- missions, and we are deeply grateful to the committee members and external - viewers for their outstanding work. After meticulous deliberation, the Program Committee, which was chaired by Michel Abdalla and Paulo S. L. M. Barreto, selected 19 submissions for presentationat the conference. These are the articles included in this volume. In addition to these presentations, the program also included four invited talks. The reviewing process was run using the iChair software,written by Thomas Baign` eresfromCryptoExperts,FranceandMatthieuFiniaszfromEPFL,LASEC, Switzerland. We are grateful to them for letting us use their software and to ´ JacquesBeigbederfromtheEcoleNormaleSup´ erieureforhelping withthe setup of the reviewing website.

19

Con tecnología Koha