000 | 03938nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-642-33481-8 | ||
003 | DE-He213 | ||
005 | 20160624102218.0 | ||
007 | cr nn 008mamaa | ||
008 | 120822s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642334818 _9978-3-642-33481-8 |
||
024 | 7 |
_a10.1007/978-3-642-33481-8 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
245 | 1 | 0 |
_aProgress in Cryptology – LATINCRYPT 2012 _h[electronic resource] : _b2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings / _cedited by Alejandro Hevia, Gregory Neven. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXII, 323 p. 26 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7533 |
|
505 | 0 | _aIndifferentiable Hashing to Barreto–Naehrig Curves -- Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves -- Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields -- Message-Based Traitor Tracing with Optimal Ciphertext Rate -- Leakage-Resilient Spatial Encryption -- On the Pseudorandom Function Assumption in (Secure) Distance- Bounding Protocols: PRF-ness alone Does Not Stop the Frauds! -- Lattice-Based Hierarchical Inner Product Encryption -- Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware -- The Security Impact of a New Cryptographic Library -- Faster Implementation of Scalar Multiplication on Koblitz Curves -- Zero-Knowledge for Multivariate Polynomials -- Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field -- UOWHFs from OWFs: Trading Regularity for Efficiency -- Random Mappings with Restricted Preimages -- On the Sosemanuk Related Key-IV Sets -- High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller -- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. | |
520 | _aThis book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData protection. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aComputational complexity. | |
650 | 0 | _aComputer vision. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aDiscrete Mathematics in Computer Science. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aComputer Imaging, Vision, Pattern Recognition and Graphics. |
700 | 1 |
_aHevia, Alejandro. _eeditor. |
|
700 | 1 |
_aNeven, Gregory. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642334801 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7533 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-33481-8 |
942 |
_2EBK10495 _cEBK |
||
999 |
_c39789 _d39789 |