


default search action
3. LATINCRYPT 2014: Florianópolis, Brazil
- Diego F. Aranha

, Alfred Menezes:
Progress in Cryptology - LATINCRYPT 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florianópolis, Brazil, September 17-19, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8895, Springer 2015, ISBN 978-3-319-16294-2
Invited Talks
- Kristin E. Lauter, Adriana López-Alt, Michael Naehrig:

Private Computation on Encrypted Genomic Data. 3-27
Cryptographic Engineering
- Gesine Hinterwälder, Amir Moradi

, Michael Hutter, Peter Schwabe, Christof Paar:
Full-Size High-Security ECC Implementation on MSP430 Microcontrollers. 31-47 - Matthias Geihs, Daniel Cabarcas:

Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms. 48-63 - Daniel J. Bernstein, Bernard van Gastel, Wesley Janssen, Tanja Lange, Peter Schwabe, Sjaak Smetsers:

TweetNaCl: A Crypto Library in 100 Tweets. 64-83 - Özgür Dagdelen, Rachid El Bansarkhani, Florian Göpfert, Tim Güneysu

, Tobias Oder, Thomas Pöppelmann, Ana Helena Sánchez, Peter Schwabe:
High-Speed Signatures from Standard Lattices. 84-103 - Benjamin Buhrow, Paul Riemer, Mike Shea, Barry K. Gilbert, Erik S. Daniel:

Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded Applications. 104-123
Side-Channel Attacks and Countermeasures
- Fabrizio De Santis, Stefan Rass

:
On Efficient Leakage-Resilient Pseudorandom Functions with Hard-to-Invert Leakages. 127-145 - Dionathan Nakamura, Routo Terada:

RSA and Elliptic Curve Least Significant Bit Security. 146-161 - Mireille Fouquet, Josep M. Miret

, Javier Valera
:
Isogeny Volcanoes of Elliptic Curves and Sylow Subgroups. 162-175
Privacy
- Pablo García, Jeroen van de Graaf, Alejandro Hevia

, Alfredo Viola:
Beating the Birthday Paradox in Dining Cryptographer Networks. 179-198 - Caroline Fontaine, Sébastien Gambs, Julien Lolive, Cristina Onete:

Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes. 199-218 - Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:

Anonymous Authentication with Shared Secrets. 219-236
Cryptanalysis
- Massimo Chenal, Qiang Tang:

On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes. 239-258 - Stefan Kölbl, Christian Rechberger:

Practical Attacks on AES-like Cryptographic Hash Functions. 259-273 - Andrey Bogdanov, Christoph Dobraunig

, Maria Eichlseder
, Martin M. Lauridsen, Florian Mendel
, Martin Schläffer, Elmar Tischhauser:
Key Recovery Attacks on Recent Authenticated Ciphers. 274-287 - Robert Fitzpatrick, Christian H. Bischof, Johannes Buchmann, Özgür Dagdelen, Florian Göpfert, Artur Mariano, Bo-Yin Yang:

Tuning GaussSieve for Speed. 288-305 - Jean-Philippe Aumasson, Philipp Jovanovic, Samuel Neves

:
Analysis of NORX: Investigating Differential and Rotational Properties. 306-324
Cryptographic Protocols
- Essam Ghadafi

:
Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability. 327-347 - Vishal Saraswat

, Sumit Kumar Pandey
:
How to Leak a Secret and Reap the Rewards Too. 348-367 - Enrique Larraia

:
Extending Oblivious Transfer Efficiently - or - How to Get Active Security with Constant Cryptographic Overhead. 368-386

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














