Limit search to available items
Book Cover
E-book
Author IMA International Conference (14th : 2013 : Oxford, England)

Title Cryptography and coding : 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings / Martijn Stam (ed.)
Published Heidelberg : Springer, 2013

Copies

Description 1 online resource (xii, 365 pages) : illustrations
Series Lecture Notes in Computer Science, 0302-9743 ; 8308
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8308. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Bits and Booleans. Semi-bent Functions from Oval Polynomials / Sihem Mesnager -- Efficient Generation of Elementary Sequences / David Gardner, Ana Sălăgean and Raphael C.-W. Phan -- Homomorphic Encryption. On the Homomorphic Computation of Symmetric Cryptographic Primitives / Silvia Mella and Ruggero Susella -- Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme / Joppe W. Bos, Kristin Lauter, Jake Loftus and Michael Naehrig -- On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption / Joël Alwen, Manuel Barbosa, Pooya Farshim [and others] -- Codes and Applications. On Minimal and Quasi-minimal Linear Codes / Gérard D. Cohen, Sihem Mesnager and Alain Patey -- A Code-Based Undeniable Signature Scheme / Carlos Aguilar-Melchor, Slim Bettaieb, Philippe Gaborit and Julien Schrek -- Cryptanalysis. Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis / James McLaughlin and John A. Clark -- Differential Cryptanalysis of Keccak Variants / Stefan Kölbl, Florian Mendel, Tomislav Nad and Martin Schläffer -- Recovering Private Keys Generated with Weak PRNGs / Pierre-Alain Fouque, Mehdi Tibouchi and Jean-Christophe Zapalowicz -- Protecting against Leakage -- A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme / David Galindo and Srinivas Vivek -- High-order Masking by Using Coding Theory and Its Application to AES / Guilhem Castagnos, Soline Renner and Gilles Zémor -- Hash Functions. Hashing Mode Using a Lightweight Blockcipher / Hidenori Kuwakado and Shoichi Hirose -- Indifferentiability of Double Length Compression Functions / Bart Mennink -- Security Amplification against Meet-in-the-Middle Attacks Using Whitening / Pierre-Alain Fouque and Pierre Karpman -- Key Issues. Secure Key Management in the Cloud / Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen and Jakob I. Pagter -- Estimating Key Sizes for High Dimensional Lattice-Based Systems / Joop van de Pol and Nigel P. Smart -- Public Key Primitives. Sub-linear Blind Ring Signatures without Random Oracles / Essam M. Ghadafi -- Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption / Rintaro Nakano and Junji Shikata -- Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings / Somindu C. Ramanna and Palash Sarkar
Summary This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December 2013. The 20 papers presented were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: bits and booleans; homomorphic encryption; codes and applications; cryptanalysis; protecting against leakage; hash functions; key issues and public key primitives
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed December 16, 2013)
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security.
Computer Security
Computer security
Data encryption (Computer science)
Engineering & Applied Sciences.
Computer Science.
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Stam, Martijn, editor
ISBN 9783642452390
3642452396
3642452388
9783642452383
Other Titles IMACC 2013