International Conference on Cryptology and Information Security in Latin America最新文献

筛选
英文 中文
Constructions for Quantum Indistinguishability Obfuscation 量子不可分辨混淆的构造
International Conference on Cryptology and Information Security in Latin America Pub Date : 2020-05-29 DOI: 10.1007/978-3-030-88238-9_2
A. Broadbent, R. Kazmi
{"title":"Constructions for Quantum Indistinguishability Obfuscation","authors":"A. Broadbent, R. Kazmi","doi":"10.1007/978-3-030-88238-9_2","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_2","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132844403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimally Indifferentiable Double-Block-Length Hashing Without Post-processing and with Support for Longer Key Than Single Block 无后处理的最佳不可微双块长度哈希,支持比单块更长的密钥
International Conference on Cryptology and Information Security in Latin America Pub Date : 2019-10-02 DOI: 10.1007/978-3-030-30530-7_4
Yusuke Naito
{"title":"Optimally Indifferentiable Double-Block-Length Hashing Without Post-processing and with Support for Longer Key Than Single Block","authors":"Yusuke Naito","doi":"10.1007/978-3-030-30530-7_4","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_4","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116756362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Don't Forget Your Roots: Constant-Time Root Finding over mathbb F_2^m F 2 m 别忘了你的根:常数时间求根/ mathbb F_2^m f2m
International Conference on Cryptology and Information Security in Latin America Pub Date : 2019-10-02 DOI: 10.1007/978-3-030-30530-7_6
D. Martins, Gustavo Banegas, Ricardo Felipe Custódio
{"title":"Don't Forget Your Roots: Constant-Time Root Finding over mathbb F_2^m F 2 m","authors":"D. Martins, Gustavo Banegas, Ricardo Felipe Custódio","doi":"10.1007/978-3-030-30530-7_6","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_6","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"69 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132355731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to Sign with White-Boxed AES 如何使用白盒AES进行签名
International Conference on Cryptology and Information Security in Latin America Pub Date : 2019-10-02 DOI: 10.1007/978-3-030-30530-7_13
M. Fischlin, Helene Haagh
{"title":"How to Sign with White-Boxed AES","authors":"M. Fischlin, Helene Haagh","doi":"10.1007/978-3-030-30530-7_13","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_13","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132150531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Breaking Randomized Mixed-Radix Scalar Multiplication Algorithms 打破随机混合基数标量乘法算法
International Conference on Cryptology and Information Security in Latin America Pub Date : 2019-10-02 DOI: 10.1007/978-3-030-30530-7_2
J. Detrey, L. Imbert
{"title":"Breaking Randomized Mixed-Radix Scalar Multiplication Algorithms","authors":"J. Detrey, L. Imbert","doi":"10.1007/978-3-030-30530-7_2","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_2","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cold Boot Attacks on Bliss 对Bliss的冷启动攻击
International Conference on Cryptology and Information Security in Latin America Pub Date : 2019-10-02 DOI: 10.1007/978-3-030-30530-7_3
Ricardo Villanueva-Polanco
{"title":"Cold Boot Attacks on Bliss","authors":"Ricardo Villanueva-Polanco","doi":"10.1007/978-3-030-30530-7_3","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_3","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Compact and Simple RLWE Based Key Encapsulation Mechanism 紧凑简单的RLWE密钥封装机制
International Conference on Cryptology and Information Security in Latin America Pub Date : 2019-10-02 DOI: 10.1007/978-3-030-30530-7_12
E. Alkım, Yusuf Alper Bilgin, Murat Cenk
{"title":"Compact and Simple RLWE Based Key Encapsulation Mechanism","authors":"E. Alkım, Yusuf Alper Bilgin, Murat Cenk","doi":"10.1007/978-3-030-30530-7_12","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_12","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Fast White-Box Implementations of Dedicated Ciphers on the ARMv8 Architecture ARMv8架构上专用密码的快速白盒实现
International Conference on Cryptology and Information Security in Latin America Pub Date : 2019-10-02 DOI: 10.1007/978-3-030-30530-7_17
Félix Carvalho Rodrigues, Hayato Fujii, Ana Clara Zoppi Serpa, Giuliano Sider, R. Dahab, J. C. López-Hernández
{"title":"Fast White-Box Implementations of Dedicated Ciphers on the ARMv8 Architecture","authors":"Félix Carvalho Rodrigues, Hayato Fujii, Ana Clara Zoppi Serpa, Giuliano Sider, R. Dahab, J. C. López-Hernández","doi":"10.1007/978-3-030-30530-7_17","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_17","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117248784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Fast Algebraic Immunity of Majority Functions 多数函数的快速代数免疫
International Conference on Cryptology and Information Security in Latin America Pub Date : 2019-10-02 DOI: 10.1007/978-3-030-30530-7_5
Pierrick Méaux
{"title":"On the Fast Algebraic Immunity of Majority Functions","authors":"Pierrick Méaux","doi":"10.1007/978-3-030-30530-7_5","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_5","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"25 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120845028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract) 具有Nonce误用和物理泄漏的身份验证加密:定义、分离结果和第一次构造-(扩展摘要)
International Conference on Cryptology and Information Security in Latin America Pub Date : 2019-10-02 DOI: 10.1007/978-3-030-30530-7_8
Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
{"title":"Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract)","authors":"Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert","doi":"10.1007/978-3-030-30530-7_8","DOIUrl":"https://doi.org/10.1007/978-3-030-30530-7_8","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116929805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信