


default search action
14th IMA 2013: Oxford, UK
- Martijn Stam:
Cryptography and Coding - 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings. Lecture Notes in Computer Science 8308, Springer 2013, ISBN 978-3-642-45238-3
Bits and Booleans
- Sihem Mesnager:
Semi-bent Functions from Oval Polynomials. 1-15 - David Gardner, Ana Salagean, Raphael C.-W. Phan:
Efficient Generation of Elementary Sequences. 16-27
Homomorphic Encryption
- Silvia Mella, Ruggero Susella:
On the Homomorphic Computation of Symmetric Cryptographic Primitives. 28-44 - Joppe W. Bos, Kristin E. Lauter, Jake Loftus, Michael Naehrig:
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. 45-64 - Joël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro, David A. Wilson:
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption. 65-84
Codes and Applications
- Gérard D. Cohen, Sihem Mesnager, Alain Patey:
On Minimal and Quasi-minimal Linear Codes. 85-98 - Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Julien Schrek:
A Code-Based Undeniable Signature Scheme. 99-119
Cryptanalysis
- James McLaughlin, John A. Clark:
Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis. 120-140 - Stefan Kölbl, Florian Mendel
, Tomislav Nad, Martin Schläffer:
Differential Cryptanalysis of Keccak Variants. 141-157 - Pierre-Alain Fouque
, Mehdi Tibouchi
, Jean-Christophe Zapalowicz:
Recovering Private Keys Generated with Weak PRNGs. 158-172
Protecting against Leakage
- David Galindo, Srinivas Vivek
:
A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme. 173-192 - Guilhem Castagnos, Soline Renner, Gilles Zémor:
High-order Masking by Using Coding Theory and Its Application to AES. 193-212
Hash Functions
- Hidenori Kuwakado, Shoichi Hirose:
Hashing Mode Using a Lightweight Blockcipher. 213-231 - Bart Mennink:
Indifferentiability of Double Length Compression Functions. 232-251 - Pierre-Alain Fouque, Pierre Karpman:
Security Amplification against Meet-in-the-Middle Attacks Using Whitening. 252-269
Key Issues
- Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen
, Jakob Illeborg Pagter:
Secure Key Management in the Cloud. 270-289 - Joop van de Pol, Nigel P. Smart:
Estimating Key Sizes for High Dimensional Lattice-Based Systems. 290-303
Public Key Primitives
- Essam Ghadafi
:
Sub-linear Blind Ring Signatures without Random Oracles. 304-323 - Rintaro Nakano, Junji Shikata:
Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption. 324-343 - Somindu C. Ramanna, Palash Sarkar:
Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings. 344-363

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.