Skip to main content
  • Conference proceedings
  • © 2010

Progress in Cryptology - LATINCRYPT 2010

First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6212)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): LATINCRYPT: International Conference on Cryptology and Information Security in Latin America

Conference proceedings info: LATINCRYPT 2010.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (19 papers)

  1. Front Matter

  2. Encryption

    1. Broadcast Encryption with Multiple Trust Authorities

      • Kent D. Boklan, Alexander W. Dent, Christopher A. Seaman
      Pages 1-19
    2. Security of Sequential Multiple Encryption

      • Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito
      Pages 20-39
    3. Mediated Traceable Anonymous Encryption

      • Malika Izabachène, David Pointcheval, Damien Vergnaud
      Pages 40-60
  3. Elliptic Curves

    1. Starfish on Strike

      • Daniel J. Bernstein, Peter Birkner, Tanja Lange
      Pages 61-80
  4. Implementation of Pairings

    1. Fixed Argument Pairings

      • Craig Costello, Douglas Stebila
      Pages 92-108
    2. New Software Speed Records for Cryptographic Pairings

      • Michael Naehrig, Ruben Niederhagen, Peter Schwabe
      Pages 109-123
  5. Implementation of Cryptographic Algorithms

    1. Accelerating Lattice Reduction with FPGAs

      • Jérémie Detrey, Guillaume Hanrot, Xavier Pujol, Damien Stehlé
      Pages 124-143
    2. Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets

      • Diego F. Aranha, Julio López, Darrel Hankerson
      Pages 144-161
  6. Cryptographic Protocols and Foundations

    1. Communication Optimal Multi-valued Asynchronous Broadcast Protocol

      • Arpita Patra, C. Pandu Rangan
      Pages 162-177
    2. On the Impossibility of Batch Update for Cryptographic Accumulators

      • Philippe Camacho, Alejandro Hevia
      Pages 178-188
    3. On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations

      • S. Dov Gordon, Hoeteck Wee, David Xiao, Arkady Yerukhimovich
      Pages 189-204
  7. Cryptanalysis of Symmetric Primitives

    1. Generic Attacks on Misty Schemes

      • Valérie Nachef, Jacques Patarin, Joana Treger
      Pages 222-240
  8. Post-Quantum Cryptography

    1. Cryptanalysis of the Hidden Matrix Cryptosystem

      • Jean-Charles Faugère, Antoine Joux, Ludovic Perret, Joana Treger
      Pages 241-254
    2. A Lattice-Based Threshold Ring Signature Scheme

      • Pierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva
      Pages 255-272
  9. Side-Channel Attacks

    1. Defeating Any Secret Cryptography with SCARE Attacks

      • Sylvain Guilley, Laurent Sauvage, Julien Micolod, Denis Réal, Frédéric Valette
      Pages 273-293
    2. How Leaky Is an Extractor?

      • François-Xavier Standaert
      Pages 294-304
    3. Combined Implementation Attack Resistant Exponentiation

      • Jörn-Marc Schmidt, Michael Tunstall, Roberto Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald
      Pages 305-322

Other Volumes

  1. Progress in Cryptology – LATINCRYPT 2010

About this book

This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010.
The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 submissions. The topics covered are encryption, elliptic curves, implementation of pairings, implementation of cryptographic algorithms, cryptographic protocols and foundations, cryptanalysis of symmetric primitives, post-quantum cryptography, and side-channel attacks.

Keywords

  • coding theory
  • complexity theory
  • cryptanalysis
  • cryptoanalysis
  • cryptographic protocol
  • cryptographic protocols
  • cryptography
  • cryptology
  • encryption
  • hash function
  • information security
  • information theory
  • network security
  • quantum computing
  • security

Editors and Affiliations

  • Computer Science Department, École Normale Supérieure, Paris Cedex 05, France

    Michel Abdalla

  • Computer Architecture and Networking Laboratory (LARC), Universidade de Sáo Paulo, Brazil

    Paulo S. L. M. Barreto

Bibliographic Information

  • Book Title: Progress in Cryptology - LATINCRYPT 2010

  • Book Subtitle: First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings

  • Editors: Michel Abdalla, Paulo S. L. M. Barreto

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-14712-8

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2010

  • Softcover ISBN: 978-3-642-14711-1Published: 30 July 2010

  • eBook ISBN: 978-3-642-14712-8Published: 30 July 2010

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XII, 323

  • Number of Illustrations: 47 b/w illustrations

  • Topics: Cryptology

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions