


default search action
1. LATINCRYPT 2010: Puebla, Mexico
- Michel Abdalla

, Paulo S. L. M. Barreto:
Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings. Lecture Notes in Computer Science 6212, Springer 2010, ISBN 978-3-642-14711-1
Encryption
- Kent D. Boklan, Alexander W. Dent, Christopher A. Seaman:

Broadcast Encryption with Multiple Trust Authorities. 1-19 - Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito:

Security of Sequential Multiple Encryption. 20-39 - Malika Izabachène, David Pointcheval

, Damien Vergnaud
:
Mediated Traceable Anonymous Encryption. 40-60
Elliptic Curves
- Daniel J. Bernstein, Peter Birkner, Tanja Lange:

Starfish on Strike. 61-80 - Pierre-Alain Fouque, Mehdi Tibouchi

:
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves. 81-91
Implementation of Pairings
- Craig Costello

, Douglas Stebila
:
Fixed Argument Pairings. 92-108 - Michael Naehrig, Ruben Niederhagen, Peter Schwabe:

New Software Speed Records for Cryptographic Pairings. 109-123
Implementation of Cryptographic Algorithms
- Jérémie Detrey, Guillaume Hanrot, Xavier Pujol, Damien Stehlé:

Accelerating Lattice Reduction with FPGAs. 124-143 - Diego F. Aranha

, Julio López, Darrel Hankerson:
Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets. 144-161
Cryptographic Protocols and Foundations
- Arpita Patra, C. Pandu Rangan:

Communication Optimal Multi-valued Asynchronous Broadcast Protocol. 162-177 - Philippe Camacho, Alejandro Hevia

:
On the Impossibility of Batch Update for Cryptographic Accumulators. 178-188 - S. Dov Gordon, Hoeteck Wee, David Xiao, Arkady Yerukhimovich:

On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations. 189-204
Cryptanalysis of Symmetric Primitives
- Çagdas Çalik, Meltem Sönmez Turan:

Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256. 205-221 - Valérie Nachef, Jacques Patarin, Joana Treger:

Generic Attacks on Misty Schemes. 222-240
Post-Quantum Cryptography
- Jean-Charles Faugère, Antoine Joux

, Ludovic Perret, Joana Treger:
Cryptanalysis of the Hidden Matrix Cryptosystem. 241-254 - Pierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva:

A Lattice-Based Threshold Ring Signature Scheme. 255-272
Side-Channel Attacks
- Sylvain Guilley, Laurent Sauvage, Julien Micolod, Denis Réal, Frédéric Valette:

Defeating Any Secret Cryptography with SCARE Attacks. 273-293 - François-Xavier Standaert

:
How Leaky Is an Extractor? 294-304 - Jörn-Marc Schmidt, Michael Tunstall

, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper, David F. Oswald
:
Combined Implementation Attack Resistant Exponentiation. 305-322

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














