This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography.
Author(s): Pierre-Alain Fouque, Mehdi Tibouchi (auth.), Alejandro Hevia, Gregory Neven (eds.)
Series: Lecture Notes in Computer Science 7533 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2012
Language: English
Pages: 323
City: Berlin ; New York
Tags: Data Encryption; Systems and Data Security; Computer Communication Networks; Discrete Mathematics in Computer Science; Coding and Information Theory; Computer Imaging, Vision, Pattern Recognition and Graphics
Front Matter....Pages -
Indifferentiable Hashing to Barreto–Naehrig Curves....Pages 1-17
Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves....Pages 18-36
Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields....Pages 37-55
Message-Based Traitor Tracing with Optimal Ciphertext Rate....Pages 56-77
Leakage-Resilient Spatial Encryption....Pages 78-99
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols....Pages 100-120
Lattice-Based Hierarchical Inner Product Encryption....Pages 121-138
Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware....Pages 139-158
The Security Impact of a New Cryptographic Library....Pages 159-176
Faster Implementation of Scalar Multiplication on Koblitz Curves....Pages 177-193
Zero-Knowledge for Multivariate Polynomials....Pages 194-213
Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field....Pages 214-233
UOWHFs from OWFs: Trading Regularity for Efficiency....Pages 234-253
Random Mappings with Restricted Preimages....Pages 254-270
On the Sosemanuk Related Key-IV Sets....Pages 271-287
High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller....Pages 288-304
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output....Pages 305-321
Back Matter....Pages -