This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010.
The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 submissions. The topics covered are encryption, elliptic curves, implementation of pairings, implementation of cryptographic algorithms, cryptographic protocols and foundations, cryptanalysis of symmetric primitives, post-quantum cryptography, and side-channel attacks.
Author(s): Kent D. Boklan, Alexander W. Dent, Christopher A. Seaman (auth.), Michel Abdalla, Paulo S. L. M. Barreto (eds.)
Series: Lecture Notes in Computer Science 6212 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010
Language: English
Pages: 323
Tags: Data Encryption
Front Matter....Pages -
Broadcast Encryption with Multiple Trust Authorities....Pages 1-19
Security of Sequential Multiple Encryption....Pages 20-39
Mediated Traceable Anonymous Encryption....Pages 40-60
Starfish on Strike....Pages 61-80
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves....Pages 81-91
Fixed Argument Pairings....Pages 92-108
New Software Speed Records for Cryptographic Pairings....Pages 109-123
Accelerating Lattice Reduction with FPGAs....Pages 124-143
Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets....Pages 144-161
Communication Optimal Multi-valued Asynchronous Broadcast Protocol....Pages 162-177
On the Impossibility of Batch Update for Cryptographic Accumulators....Pages 178-188
On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations....Pages 189-204
Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256....Pages 205-221
Generic Attacks on Misty Schemes....Pages 222-240
Cryptanalysis of the Hidden Matrix Cryptosystem....Pages 241-254
A Lattice-Based Threshold Ring Signature Scheme....Pages 255-272
Defeating Any Secret Cryptography with SCARE Attacks....Pages 273-293
How Leaky Is an Extractor?....Pages 294-304
Combined Implementation Attack Resistant Exponentiation....Pages 305-322
Back Matter....Pages -