Progress in Cryptology - LATINCRYPT 2014

Progress in Cryptology - LATINCRYPT 2014

Author: Diego F. Aranha

Publisher: Springer

Published: 2015-03-28

Total Pages: 389

ISBN-13: 3319162950

DOWNLOAD EBOOK

This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianópolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on cryptographic engineering, side-channel attacks and countermeasures, privacy, crypto analysis and cryptographic protocols.


Progress in Cryptology -- LATINCRYPT 2015

Progress in Cryptology -- LATINCRYPT 2015

Author: Kristin Lauter

Publisher: Springer

Published: 2015-08-15

Total Pages: 385

ISBN-13: 3319221744

DOWNLOAD EBOOK

This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015. The 20 papers presented were carefully reviewed and selected from 49 submissions. They were organized in topical sections named: cryptographic protocols; foundations; post-quantum cryptography; symmetric key cryptanalysis; we still love pairings; curves in cryptography; and cryptographic engineering.


Progress in Cryptology – LATINCRYPT 2017

Progress in Cryptology – LATINCRYPT 2017

Author: Tanja Lange

Publisher: Springer

Published: 2019-07-19

Total Pages: 417

ISBN-13: 3030252833

DOWNLOAD EBOOK

This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017. The 20 papers presented were carefully reviewed and selected from 64 submissions. They are organized in the following topical sections: security protocols; public-key implementation; cryptanalysis; theory of symmetric-key cryptography; multiparty computation and privacy; new constructions; and adversarial cryptography.


Progress in Cryptology – LATINCRYPT 2021

Progress in Cryptology – LATINCRYPT 2021

Author: Patrick Longa

Publisher: Springer Nature

Published: 2021-09-29

Total Pages: 476

ISBN-13: 3030882381

DOWNLOAD EBOOK

This book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021. The conference was originally planned to take place in Bogota, Colombia, but changed to a virtual event due to the COVID-19 pandemic. The 22 full papers included in this volume were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: quantum cryptography; post-quantum cryptography; asymmetric cryptanalysis; cryptanalysis and side-channel analysis; distributed cryptographic protocols; and multiparty computation.


Progress in Cryptology – LATINCRYPT 2019

Progress in Cryptology – LATINCRYPT 2019

Author: Peter Schwabe

Publisher: Springer Nature

Published: 2019-09-09

Total Pages: 386

ISBN-13: 3030305309

DOWNLOAD EBOOK

This book constitutes the proceedings of the 6th International Conference on Cryptology and Security in Latin America, LATINCRYPT 2019, held in Santiago di Chile, Chile, in October 2019. The 18 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptoanalysis, symmetric cryptography, ide-channel cryptography, post-quantum cryptography, signatures and protocols, and implementation.


Recent Advances in Information and Communication Technology 2018

Recent Advances in Information and Communication Technology 2018

Author: Herwig Unger

Publisher: Springer

Published: 2018-06-26

Total Pages: 352

ISBN-13: 3319936921

DOWNLOAD EBOOK

This book contains the research contributions presented at the 14th International Conference on Computing and Information Technology (IC2IT 2018) organised by King Mongkut’s University of Technology North Bangkok and its partners, and held in the northern Thai city of Chiang Mai in July 2018. Traditionally, IC2IT 2018 provides a forum for exchange on the state of the art and on expected future developments in its field. Correspondingly, this book contains chapters on topics in data mining, machine learning, natural language processing, image processing, networks and security, software engineering and information technology. With them, the editors want to foster inspiring discussions among colleagues, not only during the conference. It is also intended to contribute to a deeper understanding of the underlying problems as needed to solve them in complex environments and, beneficial for this purpose, to encourage interdisciplinary cooperation.


Progress in Cryptology – LATINCRYPT 2023

Progress in Cryptology – LATINCRYPT 2023

Author: Abdelrahaman Aly

Publisher: Springer Nature

Published: 2023-09-25

Total Pages: 401

ISBN-13: 3031444698

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.


Progress in Cryptology – AFRICACRYPT 2016

Progress in Cryptology – AFRICACRYPT 2016

Author: David Pointcheval

Publisher: Springer

Published: 2016-04-07

Total Pages: 370

ISBN-13: 331931517X

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed proceedings of the 8th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016, held in Fes, Morooco, in April 2016. The 18 papers presented in this book were carefully reviewed and selected from 65 submissions. The aim of Africacrypt 2016 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography. Topics of interest are such as lattices; elliptic curves; secret-key cryptanalysis; efficient implementations; secure protocols; and public-key cryptography.


Lattice-Based Public-Key Cryptography in Hardware

Lattice-Based Public-Key Cryptography in Hardware

Author: Sujoy Sinha Roy

Publisher: Springer Nature

Published: 2019-11-12

Total Pages: 109

ISBN-13: 9813299940

DOWNLOAD EBOOK

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.


Guide to Pairing-Based Cryptography

Guide to Pairing-Based Cryptography

Author: Nadia El Mrabet

Publisher: CRC Press

Published: 2017-01-06

Total Pages: 587

ISBN-13: 1315353148

DOWNLOAD EBOOK

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.