International Conference on Cryptology and Information Security in Latin America最新文献

筛选
英文 中文
High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers 基于8位ATxmega微控制器的高性能理想格加密技术
International Conference on Cryptology and Information Security in Latin America Pub Date : 2015-08-23 DOI: 10.1007/978-3-319-22174-8_19
T. Pöppelmann, Tobias Oder, T. Güneysu
{"title":"High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers","authors":"T. Pöppelmann, Tobias Oder, T. Güneysu","doi":"10.1007/978-3-319-22174-8_19","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_19","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130615568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 128
Improved Sieving on Algebraic Curves 代数曲线上改进的筛分
International Conference on Cryptology and Information Security in Latin America Pub Date : 2015-08-23 DOI: 10.1007/978-3-319-22174-8_16
Vanessa Vitse, Alexandre Wallet
{"title":"Improved Sieving on Algebraic Curves","authors":"Vanessa Vitse, Alexandre Wallet","doi":"10.1007/978-3-319-22174-8_16","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_16","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121835521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Depth Optimized Efficient Homomorphic Sorting 深度优化高效同态排序
International Conference on Cryptology and Information Security in Latin America Pub Date : 2015-08-23 DOI: 10.1007/978-3-319-22174-8_4
Gizem S. Çetin, Yarkin Doröz, B. Sunar, E. Savaş
{"title":"Depth Optimized Efficient Homomorphic Sorting","authors":"Gizem S. Çetin, Yarkin Doröz, B. Sunar, E. Savaş","doi":"10.1007/978-3-319-22174-8_4","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_4","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121186537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Computing Optimal 2-3 Chains for Pairings 计算最优的2-3链配对
International Conference on Cryptology and Information Security in Latin America Pub Date : 2015-08-23 DOI: 10.1007/978-3-319-22174-8_13
Alexis Gonzales, N. Thériault
{"title":"Computing Optimal 2-3 Chains for Pairings","authors":"Alexis Gonzales, N. Thériault","doi":"10.1007/978-3-319-22174-8_13","DOIUrl":"https://doi.org/10.1007/978-3-319-22174-8_13","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123022979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability 高效分布式标签加密及其在具有高效分布式可追溯性的群签名中的应用
International Conference on Cryptology and Information Security in Latin America Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-16295-9_18
E. Ghadafi
{"title":"Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability","authors":"E. Ghadafi","doi":"10.1007/978-3-319-16295-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-16295-9_18","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125238131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms 基于环同构的同态加密的高效整数编码
International Conference on Cryptology and Information Security in Latin America Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-16295-9_3
Matthias Geihs, Daniel Cabarcas
{"title":"Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms","authors":"Matthias Geihs, Daniel Cabarcas","doi":"10.1007/978-3-319-16295-9_3","DOIUrl":"https://doi.org/10.1007/978-3-319-16295-9_3","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129327307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes 私有非对称指纹识别:一种使用Tardos代码的最优叛逆者跟踪协议
International Conference on Cryptology and Information Security in Latin America Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-16295-9_11
C. Fontaine, S. Gambs, Julien Lolive, Cristina Onete
{"title":"Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes","authors":"C. Fontaine, S. Gambs, Julien Lolive, Cristina Onete","doi":"10.1007/978-3-319-16295-9_11","DOIUrl":"https://doi.org/10.1007/978-3-319-16295-9_11","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131684695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Beating the Birthday Paradox in Dining Cryptographer Networks 破解破解密码网络的生日悖论
International Conference on Cryptology and Information Security in Latin America Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-16295-9_10
Pablo García, J. Graaf, A. Hevia, Alfredo Viola
{"title":"Beating the Birthday Paradox in Dining Cryptographer Networks","authors":"Pablo García, J. Graaf, A. Hevia, Alfredo Viola","doi":"10.1007/978-3-319-16295-9_10","DOIUrl":"https://doi.org/10.1007/978-3-319-16295-9_10","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128086850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Full-Size High-Security ECC Implementation on MSP430 Microcontrollers 全尺寸高安全性ECC在MSP430微控制器上的实现
International Conference on Cryptology and Information Security in Latin America Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-16295-9_2
Gesine Hinterwälder, A. Moradi, M. Hutter, P. Schwabe, C. Paar
{"title":"Full-Size High-Security ECC Implementation on MSP430 Microcontrollers","authors":"Gesine Hinterwälder, A. Moradi, M. Hutter, P. Schwabe, C. Paar","doi":"10.1007/978-3-319-16295-9_2","DOIUrl":"https://doi.org/10.1007/978-3-319-16295-9_2","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
TweetNaCl: A Crypto Library in 100 Tweets TweetNaCl: 100条推文中的加密库
International Conference on Cryptology and Information Security in Latin America Pub Date : 2014-09-17 DOI: 10.1007/978-3-319-16295-9_4
D. Bernstein, B. V. Gastel, Wesley Janssen, Tanja Lange, P. Schwabe, S. Smetsers
{"title":"TweetNaCl: A Crypto Library in 100 Tweets","authors":"D. Bernstein, B. V. Gastel, Wesley Janssen, Tanja Lange, P. Schwabe, S. Smetsers","doi":"10.1007/978-3-319-16295-9_4","DOIUrl":"https://doi.org/10.1007/978-3-319-16295-9_4","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114720668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信