000 04522nam a22004335i 4500
001 u374836
003 SIRSI
005 20160812084254.0
007 cr nn 008mamaa
008 100729s2010 gw | s |||| 0|eng d
020 _a9783642147128
_9978-3-642-14712-8
040 _cMX-MeUAM
050 4 _aQA76.9.A25
082 0 4 _a005.82
_223
100 1 _aAbdalla, Michel.
_eeditor.
245 1 0 _aProgress in Cryptology – LATINCRYPT 2010
_h[recurso electrónico] :
_bFirst International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, proceedings /
_cedited by Michel Abdalla, Paulo S. L. M. Barreto.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXII, 323p. 47 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6212
505 0 _aEncryption -- Broadcast Encryption with Multiple Trust Authorities -- Security of Sequential Multiple Encryption -- Mediated Traceable Anonymous Encryption -- Elliptic Curves -- Starfish on Strike -- Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves -- Implementation of Pairings -- Fixed Argument Pairings -- New Software Speed Records for Cryptographic Pairings -- Implementation of Cryptographic Algorithms -- Accelerating Lattice Reduction with FPGAs -- Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets -- Cryptographic Protocols and Foundations -- Communication Optimal Multi-valued Asynchronous Broadcast Protocol -- On the Impossibility of Batch Update for Cryptographic Accumulators -- On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations -- Cryptanalysis of Symmetric Primitives -- Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256 -- Generic Attacks on Misty Schemes -- Post-Quantum Cryptography -- Cryptanalysis of the Hidden Matrix Cryptosystem -- A Lattice-Based Threshold Ring Signature Scheme -- Side-Channel Attacks -- Defeating Any Secret Cryptography with SCARE Attacks -- How Leaky Is an Extractor? -- Combined Implementation Attack Resistant Exponentiation.
520 _aLATINCRYPT 2010 was the First International Conference on Cryptology and Information Security in Latin America and took place during August 8–11, 2010 in Puebla, Mexico. LATINCRYPT 2010 was organized by the Centro de Investigaci´ on y de Estudios Avanzados del IPN (CINVESTAV-IPN) and the Benem´ erita Universidad Aut´ onoma de Puebla (BUAP) in cooperation with The International Association for Cryptologic Research (IACR). The General Chair of the conference was Francisco Rodr´ ?guez Henr´ ?quez. The conference received 62 submissions and each submission was assigned to at least three committee members. Submissions co-authored by members of the ProgramCommittee were assigned to at least ?ve committee members. The reviewing process was challenging due to the large number of high-quality s- missions, and we are deeply grateful to the committee members and external - viewers for their outstanding work. After meticulous deliberation, the Program Committee, which was chaired by Michel Abdalla and Paulo S. L. M. Barreto, selected 19 submissions for presentationat the conference. These are the articles included in this volume. In addition to these presentations, the program also included four invited talks. The reviewing process was run using the iChair software,written by Thomas Baign` eresfromCryptoExperts,FranceandMatthieuFiniaszfromEPFL,LASEC, Switzerland. We are grateful to them for letting us use their software and to ´ JacquesBeigbederfromtheEcoleNormaleSup´ erieureforhelping withthe setup of the reviewing website.
650 0 _aComputer science.
650 0 _aData encryption (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
700 1 _aBarreto, Paulo S. L. M.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642147111
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6212
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-14712-8
596 _a19
942 _cLIBRO_ELEC
999 _c202716
_d202716