{"title":"Fast Implementation of Curve25519 Using AVX2","authors":"Armando Faz-Hernández, J. C. López-Hernández","doi":"10.1007/978-3-319-22174-8_18","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_18","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123044808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Top-Down Techniques in Differential Cryptanalysis","authors":"Itai Dinur, O. Dunkelman, Masha Gutman, A. Shamir","doi":"10.1007/978-3-319-22174-8_8","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_8","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125938792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Abdelkhalek, R. Altawy, Mohamed F. Tolba, A. Youssef
{"title":"Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3","authors":"A. Abdelkhalek, R. Altawy, Mohamed F. Tolba, A. Youssef","doi":"10.1007/978-3-319-22174-8_11","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_11","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129849580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algebraic Analysis of the Simon Block Cipher Family","authors":"H. Raddum","doi":"10.1007/978-3-319-22174-8_9","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_9","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129374462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions","authors":"E. Fujisaki, Keita Xagawa","doi":"10.1007/978-3-319-22174-8_1","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_1","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133529567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FHEW with Efficient Multibit Bootstrapping","authors":"Jean-François Biasse, Luis Ruiz","doi":"10.1007/978-3-319-22174-8_7","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_7","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130319330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher","authors":"Jorge Nakahara","doi":"10.1007/978-3-319-22174-8_10","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_10","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121059901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attacking a Binary GLS Elliptic Curve with Magma","authors":"Jesús-Javier Chi-Domínguez, Thomaz Oliveira","doi":"10.1007/978-3-319-22174-8_17","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_17","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131148634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation-Based Secure Functional Encryption in the Random Oracle Model","authors":"Vincenzo Iovino, Karol Zebrowski","doi":"10.1007/978-3-319-22174-8_2","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_2","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"225 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132443583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Software Implementation of the Hash-Based Signature Scheme MSS and Its Variants","authors":"A. K. S. Oliveira, J. C. López-Hernández","doi":"10.1007/978-3-319-22174-8_20","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_20","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121595803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}