Progress in Cryptology - LATINCRYPT 2014: Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil, September 17–19, 2014 Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianópolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on cryptographic engineering, side-channel attacks and countermeasures, privacy, crypto analysis and cryptographic protocols.

Author(s): Diego F. Aranha, Alfred Menezes (eds.)
Series: Lecture Notes in Computer Science 8895
Edition: 1
Publisher: Springer International Publishing
Year: 2015

Language: English
Pages: 387
Tags: Data Encryption; Systems and Data Security; Computer Communication Networks; Discrete Mathematics in Computer Science; Coding and Information Theory

Front Matter....Pages I-XII
Front Matter....Pages 1-1
Private Computation on Encrypted Genomic Data....Pages 3-27
Front Matter....Pages 29-29
Full-Size High-Security ECC Implementation on MSP430 Microcontrollers....Pages 31-47
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms....Pages 48-63
TweetNaCl: A Crypto Library in 100 Tweets....Pages 64-83
High-Speed Signatures from Standard Lattices....Pages 84-103
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded Applications....Pages 104-123
Front Matter....Pages 125-125
On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages....Pages 127-145
RSA and Elliptic Curve Least Significant Bit Security....Pages 146-161
Isogeny Volcanoes of Elliptic Curves and Sylow Subgroups....Pages 162-175
Front Matter....Pages 177-177
Beating the Birthday Paradox in Dining Cryptographer Networks....Pages 179-198
Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes....Pages 199-218
Anonymous Authentication with Shared Secrets....Pages 219-236
Front Matter....Pages 237-237
On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes....Pages 239-258
Practical Attacks on AES-like Cryptographic Hash Functions....Pages 259-273
Key Recovery Attacks on Recent Authenticated Ciphers....Pages 274-287
Tuning GaussSieve for Speed....Pages 288-305
Analysis of NORX: Investigating Differential and Rotational Properties....Pages 306-324
Front Matter....Pages 325-325
Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability....Pages 327-347
How to Leak a Secret and Reap the Rewards Too....Pages 348-367
Extending Oblivious Transfer Efficiently....Pages 368-386
Back Matter....Pages 387-387