International Conference on Cryptology and Information Security in Latin America最新文献

筛选
英文 中文
New Software Speed Records for Cryptographic Pairings 新的加密配对软件速度记录
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_7
M. Naehrig, R. Niederhagen, P. Schwabe
{"title":"New Software Speed Records for Cryptographic Pairings","authors":"M. Naehrig, R. Niederhagen, P. Schwabe","doi":"10.1007/978-3-642-14712-8_7","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_7","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124069781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 125
Starfish on Strike 海星罢工
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-08 DOI: 10.1007/978-3-642-14712-8_4
D. Bernstein, P. Birkner, T. Lange
{"title":"Starfish on Strike","authors":"D. Bernstein, P. Birkner, T. Lange","doi":"10.1007/978-3-642-14712-8_4","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_4","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126560669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Fixed Argument Pairings 固定参数对
International Conference on Cryptology and Information Security in Latin America Pub Date : 2010-08-01 DOI: 10.1007/978-3-642-14712-8_6
Craig Costello, D. Stebila
{"title":"Fixed Argument Pairings","authors":"Craig Costello, D. Stebila","doi":"10.1007/978-3-642-14712-8_6","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_6","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125628664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
On Forging SPHINCS+-Haraka Signatures on a Fault-Tolerant Quantum Computer 在容错量子计算机上锻造SPHINCS+-Haraka签名
International Conference on Cryptology and Information Security in Latin America Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-88238-9_3
Robin M. Berger, Marcel Tiepelt
{"title":"On Forging SPHINCS+-Haraka Signatures on a Fault-Tolerant Quantum Computer","authors":"Robin M. Berger, Marcel Tiepelt","doi":"10.1007/978-3-030-88238-9_3","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_3","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129098993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TEDT2 - Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption 高度安全的基于tbc的防泄漏认证加密
International Conference on Cryptology and Information Security in Latin America Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-88238-9_14
Eik List
{"title":"TEDT2 - Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption","authors":"Eik List","doi":"10.1007/978-3-030-88238-9_14","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_14","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117297712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings 密码学进展- LATINCRYPT 2010,第一届拉丁美洲密码学与信息安全国际会议,墨西哥,2010年8月8-11日,论文集
International Conference on Cryptology and Information Security in Latin America Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-14712-8
Michel Abdalla, Paulo L. Barreto, Latincrypt
{"title":"Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings","authors":"Michel Abdalla, Paulo L. Barreto, Latincrypt","doi":"10.1007/978-3-642-14712-8","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms 基于LSS同构的改进阈值签名、主动秘密共享和输入认证
International Conference on Cryptology and Information Security in Latin America Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-88238-9_19
Diego F. Aranha, Anders Dalskov, Daniel E. Escudero, Claudio Orlandi
{"title":"Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms","authors":"Diego F. Aranha, Anders Dalskov, Daniel E. Escudero, Claudio Orlandi","doi":"10.1007/978-3-030-88238-9_19","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_19","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125327277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Train or Adapt a Deeply Learned Profile? 训练或调整深度学习档案?
International Conference on Cryptology and Information Security in Latin America Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-88238-9_11
Christophe Genevey-Metat, Annelie Heuser, Benoît Gérard
{"title":"Train or Adapt a Deeply Learned Profile?","authors":"Christophe Genevey-Metat, Annelie Heuser, Benoît Gérard","doi":"10.1007/978-3-030-88238-9_11","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_11","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132546873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates Kyber的单片硬件实现:PQC候选产品中苹果与苹果的比较
International Conference on Cryptology and Information Security in Latin America Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-88238-9_6
Mojtaba Bisheh-Niasar, R. Azarderakhsh, Mehran Mozaffari Kermani
{"title":"A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates","authors":"Mojtaba Bisheh-Niasar, R. Azarderakhsh, Mehran Mozaffari Kermani","doi":"10.1007/978-3-030-88238-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_6","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125912541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo 实施性行为不当的安全报告-重新审视WhoToo
International Conference on Cryptology and Information Security in Latin America Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-88238-9_17
A. Hevia, Ilana Mergudich-Thal
{"title":"Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo","authors":"A. Hevia, Ilana Mergudich-Thal","doi":"10.1007/978-3-030-88238-9_17","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_17","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128385566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信