Progress in Cryptology -- LATINCRYPT 2015: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings

Author:   Kristin Lauter ,  Francisco Rodríguez-Henríquez
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2015
Volume:   9230
ISBN:  

9783319221731


Pages:   385
Publication Date:   30 July 2015
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Progress in Cryptology -- LATINCRYPT 2015: 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Kristin Lauter ,  Francisco Rodríguez-Henríquez
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2015
Volume:   9230
Dimensions:   Width: 15.50cm , Height: 2.10cm , Length: 23.50cm
Weight:   6.029kg
ISBN:  

9783319221731


ISBN 10:   3319221736
Pages:   385
Publication Date:   30 July 2015
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Cryptographic Protocols.- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions.- Simulation-Based Secure Functional Encryption in the Random Oracle Model.- The Simplest Protocol for Oblivious Transfer.- Foundations.- Depth Optimized Efficient Homomorphic Sorting.- The Chain Rule for HILL Pseudoentropy, Revisited.- Post-Quantum Cryptography.- Faster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive Hashing.- FHEW with Efficient Multibit Bootstrapping.- Symmetric Key Cryptanalysis.- Improved Top-Down Techniques in Differential Cryptanalysis.- Algebraic Analysis of the Simon Block Cipher Family.- Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher.- Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3.- State-Recovery Analysis of Spritz.- We Still Love Pairings Computing Optimal 2-3 Chains for Pairings.- Subgroup Security in Pairing-Based Cryptography.- Curves in Cryptography.- Twisted Hessian Curves.- Improved Sieving on Algebraic Curves.- Attacking a Binary GLS Elliptic Curve with Magma.- Cryptographic Engineering.- Fast Implementation of Curve25519 Using AVX2.- High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers.- An Efficient Software Implementation of the Hash-Based Signature Scheme MSS and Its Variants.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List