


default search action
4. LATINCRYPT 2015: Guadalajara, Mexico
- Kristin E. Lauter, Francisco Rodríguez-Henríquez:

Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings. Lecture Notes in Computer Science 9230, Springer 2015, ISBN 978-3-319-22173-1
Cryptographic Protocols
- Eiichiro Fujisaki, Keita Xagawa

:
Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions. 3-20 - Vincenzo Iovino

, Karol Zebrowski:
Simulation-Based Secure Functional Encryption in the Random Oracle Model. 21-39 - Tung Chou

, Claudio Orlandi
:
The Simplest Protocol for Oblivious Transfer. 40-58
Foundations
- Gizem S. Çetin, Yarkin Doröz, Berk Sunar, Erkay Savas:

Depth Optimized Efficient Homomorphic Sorting. 61-80 - Krzysztof Pietrzak, Maciej Skorski

:
The Chain Rule for HILL Pseudoentropy, Revisited. 81-98
Post-Quantum Cryptography
- Thijs Laarhoven

, Benne de Weger:
Faster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive Hashing. 101-118 - Jean-François Biasse

, Luis Ruiz
:
FHEW with Efficient Multibit Bootstrapping. 119-135
Symmetric Key Cryptanalysis
- Itai Dinur, Orr Dunkelman

, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. 139-156 - Håvard Raddum

:
Algebraic Analysis of the Simon Block Cipher Family. 157-169 - Jorge Nakahara Jr.:

Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher. 170-186 - Ahmed Abdelkhalek, Riham AlTawy, Mohamed Tolba, Amr M. Youssef:

Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3. 187-203 - Ralph Ankele, Stefan Kölbl, Christian Rechberger:

State-Recovery Analysis of Spritz. 204-221
We Still Love Pairings
- Alex Capuñay Gonzales

, Nicolas Thériault
:
Computing Optimal 2-3 Chains for Pairings. 225-244 - Paulo S. L. M. Barreto, Craig Costello

, Rafael Misoczki, Michael Naehrig, Geovandro C. C. F. Pereira, Gustavo H. M. Zanon:
Subgroup Security in Pairing-Based Cryptography. 245-265
Curves in Cryptography
- Daniel J. Bernstein, Chitchanok Chuengsatiansup, David Kohel, Tanja Lange:

Twisted Hessian Curves. 269-294 - Vanessa Vitse, Alexandre Wallet

:
Improved Sieving on Algebraic Curves. 295-307 - Jesús-Javier Chi-Domínguez

, Thomaz Oliveira:
Attacking a Binary GLS Elliptic Curve with Magma. 308-326
Cryptographic Engineering
- Armando Faz-Hernández

, Julio López:
Fast Implementation of Curve25519 Using AVX2. 329-345 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu

:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers. 346-365 - Ana Karina D. S. de Oliveira, Julio López:

An Efficient Software Implementation of the Hash-Based Signature Scheme MSS and Its Variants. 366-383

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














