default search action
12th IMA 2009: Cirencester, UK
- Matthew Geoffrey Parker:
Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings. Lecture Notes in Computer Science 5921, Springer 2009, ISBN 978-3-642-10867-9
Coding Theory
- Azadeh Khaleghi, Danilo Silva, Frank R. Kschischang:
Subspace Codes. 1-21 - Eirik Rosnes:
On Linear Programming Decoding on a Quantized Additive White Gaussian Noise Channel. 22-37 - Delphine Boucher, Felix Ulmer:
Codes as Modules over Skew Polynomial Rings. 38-55 - Hans Georg Schaathun:
On Higher Weights and Code Existence. 56-64 - Koichi Betsumiya, Rowena Alma L. Betty, Akihiro Munemasa:
Mass Formula for Even Codes over. 65-77 - Masaaki Harada, Akihiro Munemasa:
On the Classification of Self-dual -Codes. 78-90 - Stefania Fanali:
On Linear Codes from Maximal Curves. 91-111
Symmetric Cryptography
- Benoît Gérard, Jean-Pierre Tillich:
On Linear Cryptanalysis with Many Linear Approximations. 112-132 - Julia Borghoff, Lars R. Knudsen, Mathias Stolpe:
Bivium as a Mixed-Integer Linear Programming Problem. 133-152 - Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Security of Cyclic Double Block Length Hash Functions. 153-175 - Onur Özen, Martijn Stam:
Another Glance at Double-Length Hashing. 176-201 - Sean Murphy, Maura B. Paterson:
Geometric Ideas for Cryptographic Equation Solving in Even Characteristic. 202-221
Security Protocols
- Léonard Dallot, Damien Vergnaud:
Provably Secure Code-Based Threshold Ring Signatures. 222-235 - Sanjit Chatterjee, Koray Karabina, Alfred Menezes:
A New Protocol for the Nearby Friend Problem. 236-251 - Martin Geisler, Nigel P. Smart:
Distributing the Key Distribution Centre in Sakai-Kasahara Based Systems. 252-262 - Hao Chen, San Ling, Carles Padró, Huaxiong Wang, Chaoping Xing:
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. 263-277 - Nuttapong Attrapadung, Hideki Imai:
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. 278-300 - Dalia Khader, Liqun Chen, James H. Davenport:
Certificate-Free Attribute Authentication. 301-325
Asymmetric Cryptography
- Julien Cathalo, David Naccache, Jean-Jacques Quisquater:
Comparing with RSA. 326-335 - Koray Karabina:
Double-Exponentiation in Factor-4 Groups and Its Applications. 336-350 - Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé:
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. 351-367 - Steven D. Galbraith, Raminder S. Ruprai:
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems. 368-382
Boolean Functions
- Yves Edel, Alexander Pott:
On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions. 383-401 - Sihem Mesnager:
A New Family of Hyper-Bent Boolean Functions in Polynomial Form. 402-417 - Lars Eirik Danielsen, Matthew Geoffrey Parker, Patrick Solé:
The Rayleigh Quotient of Bent Functions. 418-432
Side Channels and Implementations
- Gregor Leander, Erik Zenner, Philip Hawkes:
Cache Timing Analysis of LFSR-Based Stream Ciphers. 433-445 - Werner Schindler, Colin D. Walter:
Optimal Recovery of Secret Keys from Weak Side Channel Traces. 446-468 - Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi:
Practical Zero-Knowledge Proofs for Circuit Evaluation. 469-494
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.