{"title":"Constructions for Quantum Indistinguishability Obfuscation","authors":"A. Broadbent, R. Kazmi","doi":"10.1007/978-3-030-88238-9_2","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_2","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132844403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimally Indifferentiable Double-Block-Length Hashing Without Post-processing and with Support for Longer Key Than Single Block","authors":"Yusuke Naito","doi":"10.1007/978-3-030-30530-7_4","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_4","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116756362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Martins, Gustavo Banegas, Ricardo Felipe Custódio
{"title":"Don't Forget Your Roots: Constant-Time Root Finding over mathbb F_2^m F 2 m","authors":"D. Martins, Gustavo Banegas, Ricardo Felipe Custódio","doi":"10.1007/978-3-030-30530-7_6","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_6","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"69 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132355731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Sign with White-Boxed AES","authors":"M. Fischlin, Helene Haagh","doi":"10.1007/978-3-030-30530-7_13","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_13","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132150531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breaking Randomized Mixed-Radix Scalar Multiplication Algorithms","authors":"J. Detrey, L. Imbert","doi":"10.1007/978-3-030-30530-7_2","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_2","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cold Boot Attacks on Bliss","authors":"Ricardo Villanueva-Polanco","doi":"10.1007/978-3-030-30530-7_3","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_3","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compact and Simple RLWE Based Key Encapsulation Mechanism","authors":"E. Alkım, Yusuf Alper Bilgin, Murat Cenk","doi":"10.1007/978-3-030-30530-7_12","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_12","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Félix Carvalho Rodrigues, Hayato Fujii, Ana Clara Zoppi Serpa, Giuliano Sider, R. Dahab, J. C. López-Hernández
{"title":"Fast White-Box Implementations of Dedicated Ciphers on the ARMv8 Architecture","authors":"Félix Carvalho Rodrigues, Hayato Fujii, Ana Clara Zoppi Serpa, Giuliano Sider, R. Dahab, J. C. López-Hernández","doi":"10.1007/978-3-030-30530-7_17","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_17","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117248784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Fast Algebraic Immunity of Majority Functions","authors":"Pierrick Méaux","doi":"10.1007/978-3-030-30530-7_5","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_5","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"25 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120845028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
{"title":"Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract)","authors":"Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert","doi":"10.1007/978-3-030-30530-7_8","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_8","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116929805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}