


default search action
5th LATINCRYPT 2017: Havana, Cuba
- Tanja Lange, Orr Dunkelman:

Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11368, Springer 2019, ISBN 978-3-030-25282-3
Invited Talk
- Phillip Rogaway:

An Obsession with Definitions. 3-20
Security Protocols
- Elena Pagnin

, Aikaterini Mitrokotsa
, Keisuke Tanaka:
Anonymous Single-Round Server-Aided Verification. 23-43 - Colin Boyd, Britta Hale

:
Secure Channels and Termination: The Last Word on TLS. 44-65 - Ela Lee:

Improved Security Notions for Proxy Re-Encryption to Enforce Access Control. 66-85
Public-Key Implementation
- Cristobal Leiva, Nicolas Thériault

:
Optimal 2-3 Chains for Scalar Multiplication. 89-108 - Hayato Fujii

, Diego F. Aranha:
Curve25519 for the Cortex-M4 and Beyond. 109-127 - Tobias Oder, Tim Güneysu

:
Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs. 128-142
Cryptanalysis
- Haruhisa Kosuge, Hidema Tanaka:

Theoretical Security Evaluation Against Side-Channel Cube Attack with Key Enumeration. 145-165 - Marc Beunardeau, Aisling Connolly, Rémi Géraud

, David Naccache:
On the Hardness of the Mersenne Low Hamming Ratio Assumption. 166-174 - Thom Wiggers

:
Energy-Efficient ARM64 Cluster with Cryptanalytic Applications - 80 Cores That Do Not Cost You an ARM and a Leg. 175-188
Theory of Symmetric-Key Cryptography
- Reynier Antonio de la Cruz Jiménez

:
Generation of 8-Bit S-Boxes Having Almost Optimal Cryptographic Properties Using Smaller 4-Bit S-Boxes and Finite Field Multiplication. 191-206 - Ashwin Jha

, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi
:
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. 207-227 - Yusuke Naito:

Improved XKX-Based AEAD Scheme: Removing the Birthday Terms. 228-246
Multiparty Computation and Privacy
- Filipp Valovich:

Aggregation of Time-Series Data Under Differential Privacy. 249-270 - Marcel Keller:

The Oblivious Machine - Or: How to Put the C into MPC. 271-288 - Aner Ben-Efraim

, Eran Omri
:
Concrete Efficiency Improvements for Multiparty Garbling with an Honest Majority. 289-308
New Constructions
- Gizem S. Çetin, Berk Sunar:

Homomorphic Rank Sort Using Surrogate Polynomials. 311-326 - Aggelos Kiayias, Giorgos Panagiotakos:

On Trees, Chains and Fast Transactions in the Blockchain. 327-351 - Dan Boneh, Rosario Gennaro, Steven Goldfeder:

Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security. 352-377
Adversarial Cryptography
- Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller

, Bülent Yener:
Environmental Authentication in Malware. 381-400 - George Teseleanu

:
Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures. 401-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














