{"title":"New Software Speed Records for Cryptographic Pairings","authors":"M. Naehrig, R. Niederhagen, P. Schwabe","doi":"10.1007/978-3-642-14712-8_7","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_7","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124069781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Starfish on Strike","authors":"D. Bernstein, P. Birkner, T. Lange","doi":"10.1007/978-3-642-14712-8_4","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_4","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126560669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fixed Argument Pairings","authors":"Craig Costello, D. Stebila","doi":"10.1007/978-3-642-14712-8_6","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8_6","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125628664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Forging SPHINCS+-Haraka Signatures on a Fault-Tolerant Quantum Computer","authors":"Robin M. Berger, Marcel Tiepelt","doi":"10.1007/978-3-030-88238-9_3","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_3","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129098993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TEDT2 - Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption","authors":"Eik List","doi":"10.1007/978-3-030-88238-9_14","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_14","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117297712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings","authors":"Michel Abdalla, Paulo L. Barreto, Latincrypt","doi":"10.1007/978-3-642-14712-8","DOIUrl":"https://doi.org/10.1007/978-3-642-14712-8","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego F. Aranha, Anders Dalskov, Daniel E. Escudero, Claudio Orlandi
{"title":"Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms","authors":"Diego F. Aranha, Anders Dalskov, Daniel E. Escudero, Claudio Orlandi","doi":"10.1007/978-3-030-88238-9_19","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_19","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125327277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Train or Adapt a Deeply Learned Profile?","authors":"Christophe Genevey-Metat, Annelie Heuser, Benoît Gérard","doi":"10.1007/978-3-030-88238-9_11","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_11","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132546873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mojtaba Bisheh-Niasar, R. Azarderakhsh, Mehran Mozaffari Kermani
{"title":"A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates","authors":"Mojtaba Bisheh-Niasar, R. Azarderakhsh, Mehran Mozaffari Kermani","doi":"10.1007/978-3-030-88238-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_6","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125912541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo","authors":"A. Hevia, Ilana Mergudich-Thal","doi":"10.1007/978-3-030-88238-9_17","DOIUrl":"https://doi.org/10.1007/978-3-030-88238-9_17","url":null,"abstract":"","PeriodicalId":183643,"journal":{"name":"International Conference on Cryptology and Information Security in Latin America","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128385566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}