default search action
15th IMA 2015: Oxford, UK
- Jens Groth:
Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Lecture Notes in Computer Science 9496, Springer 2015, ISBN 978-3-319-27238-2
Invited Paper
- Sihem Mesnager, Gérard D. Cohen, David Madore:
On Existence (Based on an Arithmetical Problem) and Constructions of Bent Functions. 3-19
Best Paper Award
- Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee:
Security Against Related Randomness Attacks via Reconstructive Extractors. 23-40
Authentication
- Wenbin Zhang, Chik How Tan:
MI-T-HFE, A New Multivariate Signature Scheme. 43-56 - David Derler, Christian Hanser, Daniel Slamanig:
A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials. 57-74
Symmetric Cryptography
- Kazuhiko Minematsu, Tetsu Iwata:
Tweak-Length Extension for Tweakable Blockciphers. 77-93 - Guy Barwell, Daniel Page, Martijn Stam:
Rogue Decryption Failures: Reconciling AE Robustness Notions. 94-111 - Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Robust Authenticated Encryption and the Limits of Symmetric Cryptography. 112-129
2-Party Computation
- Shota Goto, Junji Shikata:
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer. 133-151 - Claude Crépeau, Raza Ali Kazmi:
Zero-Knowledge Interactive Proof Systems for New Lattice Problems. 152-169
Codes
- Mónica C. Liberatori, Leonardo J. Arnone, Jorge Castiñeira Moreira, Patrick Guy Farrell:
Soft Distance Metric Decoding of Polar Codes. 173-183 - Grigory Kabatiansky, Serge G. Vladut, Cédric Tavernier:
On the Doubly Sparse Compressed Sensing Problem. 184-189 - Torleiv Kløve:
Codes of Length 2 Correcting Single Errors of Limited Size. 190-201
Boolean Functions
- Nese Koçak, Sihem Mesnager, Ferruh Özbudak:
Bent and Semi-bent Functions via Linear Translators. 205-224 - Richard Winter, Ana Salagean, Raphael C.-W. Phan:
Comparison of Cube Attacks Over Different Vector Spaces. 225-238 - Jian Liu, Sihem Mesnager, Lusheng Chen:
On the Diffusion Property of Iterated Functions. 239-253
Information Theory
- Maciej Skórski:
Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint. 257-274
Leakage Resilience
- Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. 277-294 - Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wójcik:
A Leakage Resilient MAC. 295-310 - Giuseppe Ateniese, Antonio Faonio, Seny Kamara:
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. 311-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.