default search action
10th IMA 2005: Cirencester, UK
- Nigel P. Smart:
Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings. Lecture Notes in Computer Science 3796, Springer 2005, ISBN 3-540-30276-X
Invited Papers
- Ueli M. Maurer:
Abstract Models of Computation in Cryptography. 1-12 - Neal Koblitz, Alfred Menezes:
Pairing-Based Cryptography at High Security Levels. 13-36 - Andrew Brown, Lorenz Minder, Amin Shokrollahi:
Improved Decoding of Interleaved AG Codes. 37-46
Coding Theory
- Woo Tae Kim, Se H. Kang, Eon Kyeong Joo:
Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics. 47-58 - Hans Georg Schaathun, Gérard D. Cohen:
A Trellis-Based Bound on (2, 1)-Separating Codes. 59-67 - Canhui Cai, Jing Chen:
Tessellation Based Multiple Description Coding. 68-77 - Norbert Pramstaller, Christian Rechberger, Vincent Rijmen:
Exploiting Coding Theory for Collision Attacks on SHA-1. 78-95
Signatures and Signcryption
- C. Dods, Nigel P. Smart, Martijn Stam:
Hash Based Digital Signature Schemes. 96-115 - John Malone-Lee:
A General Construction for Simultaneous Signing and Encrypting. 116-135 - Caroline Kudla, Kenneth G. Paterson:
Non-interactive Designated Verifier Proofs and Undeniable Signatures. 136-154
Symmetric Cryptography
- Chris J. Mitchell:
Partial Key Recovery Attacks on XCBC, TMAC and OMAC. 155-167 - Ueli M. Maurer, Johan Sjödin:
Domain Expansion of MACs: Alternative Uses of the FIL-MAC. 168-185 - An Braeken, Christopher Wolf, Bart Preneel:
Normality of Vectorial Functions. 186-200 - Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon:
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. 201-219
Side Channels
- Alexander W. Dent, John Malone-Lee:
The Physically Observable Security of Signature Schemes. 220-232 - Manuel Barbosa, Dan Page:
On the Automatic Construction of Indistinguishable Operations. 233-247 - Mustapha Hedabou:
Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. 248-261
Algebraic Cryptanalysis
- Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin:
Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. 262-277 - Carlos Cid, Sean Murphy, Matthew J. B. Robshaw:
An Algebraic Framework for Cipher Embeddings. 278-289 - An Braeken, Bart Preneel:
Probabilistic Algebraic Attacks. 290-303
Information Theoretic Applications
- Goce Jakimoski:
Unconditionally Secure Information Authentication in Presence of Erasures. 304-321 - Robert König, Ueli M. Maurer:
Generalized Strong Extractors and Deterministic Privacy Amplification. 322-339 - Germán Sáez:
On Threshold Self-healing Key Distribution Schemes. 340-354
Number Theoretic Foundations
- Andrey Sidorenko, Berry Schoenmakers:
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator. 355-375 - Kamel Bentahar:
The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited. 376-391 - Steven D. Galbraith, James F. McKee:
Pairings on Elliptic Curves over Finite Commutative Rings. 392-409
Public Key and ID-Based Encryption Schemes
- Martijn Stam:
A Key Encapsulation Mechanism for NTRU. 410-427 - Manuel Barbosa, Pooya Farshim:
Efficient Identity-Based Key Encapsulation to Multiple Parties. 428-441 - Liqun Chen, Zhaohui Cheng:
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. 442-459
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.