did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642147111

Progress in Cryptology - LATINCRYPT 2010 : First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings

by ;
  • ISBN13:

    9783642147111

  • ISBN10:

    3642147119

  • Format: Paperback
  • Copyright: 2010-08-17
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $109.00 Save up to $90.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010. The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 submissions. The topics covered are encryption, elliptic curves, implementation of pairings, implementation of cryptographic algorithms, cryptographic protocols and foundations, cryptanalysis of symmetric primitives, post-quantum cryptography, and side-channel attacks.

Table of Contents

Encryption
Broadcast Encryption with Multiple Trust Authoritiesp. 1
Security of Sequential Multiple Encryptionp. 20
Mediated Traceable Anonymous Encryptionp. 40
Elliptic Curves
Starfish on Strikep. 61
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curvesp. 81
Implementation of Pairings
Fixed Argument Pairingsp. 92
New Software Speed Records for Cryptographic Pairingsp. 109
Implementation of Cryptographic Algorithms
Accelerating Lattice Reduction with FPGAsp. 124
Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Setsp. 144
Cryptographic Protocols and Foundations
Communication Optimal Multi-valued Asynchronous Broadcast Protocolp. 162
On the Impossibility of Batch Update for Cryptographic Accumulatorsp. 178
On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutationsp. 189
Cryptanalysis of Symmetric Primitives
Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256p. 205
Generic Attacks on Misty Schemesp. 222
Post-Quantum Cryptography
Cryptanalysis of the Hidden Matrix Cryptosystemp. 241
A Lattice-Based Threshold Ring Signature Schemep. 255
Side-Channel Attacks
Defeating Any Secret Cryptography with SCARE Attacksp. 273
How Leaky Is an Extractor?p. 294
Combined Implementation Attack Resistant Exponentiationp. 305
Author Indexp. 323
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program