default search action
3. LATINCRYPT 2014: Florianópolis, Brazil
- Diego F. Aranha, Alfred Menezes:
Progress in Cryptology - LATINCRYPT 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florianópolis, Brazil, September 17-19, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8895, Springer 2015, ISBN 978-3-319-16294-2
Invited Talks
- Kristin E. Lauter, Adriana López-Alt, Michael Naehrig:
Private Computation on Encrypted Genomic Data. 3-27
Cryptographic Engineering
- Gesine Hinterwälder, Amir Moradi, Michael Hutter, Peter Schwabe, Christof Paar:
Full-Size High-Security ECC Implementation on MSP430 Microcontrollers. 31-47 - Matthias Geihs, Daniel Cabarcas:
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms. 48-63 - Daniel J. Bernstein, Bernard van Gastel, Wesley Janssen, Tanja Lange, Peter Schwabe, Sjaak Smetsers:
TweetNaCl: A Crypto Library in 100 Tweets. 64-83 - Özgür Dagdelen, Rachid El Bansarkhani, Florian Göpfert, Tim Güneysu, Tobias Oder, Thomas Pöppelmann, Ana Helena Sánchez, Peter Schwabe:
High-Speed Signatures from Standard Lattices. 84-103 - Benjamin Buhrow, Paul Riemer, Mike Shea, Barry K. Gilbert, Erik S. Daniel:
Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded Applications. 104-123
Side-Channel Attacks and Countermeasures
- Fabrizio De Santis, Stefan Rass:
On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages. 127-145 - Dionathan Nakamura, Routo Terada:
RSA and Elliptic Curve Least Significant Bit Security. 146-161 - Mireille Fouquet, Josep M. Miret, Javier Valera:
Isogeny Volcanoes of Elliptic Curves and Sylow Subgroups. 162-175
Privacy
- Pablo García, Jeroen van de Graaf, Alejandro Hevia, Alfredo Viola:
Beating the Birthday Paradox in Dining Cryptographer Networks. 179-198 - Caroline Fontaine, Sébastien Gambs, Julien Lolive, Cristina Onete:
Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes. 199-218 - Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Anonymous Authentication with Shared Secrets. 219-236
Cryptanalysis
- Massimo Chenal, Qiang Tang:
On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes. 239-258 - Stefan Kölbl, Christian Rechberger:
Practical Attacks on AES-like Cryptographic Hash Functions. 259-273 - Andrey Bogdanov, Christoph Dobraunig, Maria Eichlseder, Martin M. Lauridsen, Florian Mendel, Martin Schläffer, Elmar Tischhauser:
Key Recovery Attacks on Recent Authenticated Ciphers. 274-287 - Robert Fitzpatrick, Christian H. Bischof, Johannes Buchmann, Özgür Dagdelen, Florian Göpfert, Artur Mariano, Bo-Yin Yang:
Tuning GaussSieve for Speed. 288-305 - Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves:
Analysis of NORX: Investigating Differential and Rotational Properties. 306-324
Cryptographic Protocols
- Essam Ghadafi:
Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability. 327-347 - Vishal Saraswat, Sumit Kumar Pandey:
How to Leak a Secret and Reap the Rewards Too. 348-367 - Enrique Larraia:
Extending Oblivious Transfer Efficiently - or - How to Get Active Security with Constant Cryptographic Overhead. 368-386
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.