


default search action
13th IMA 2011: Oxford, UK
- Liqun Chen:
Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings. Lecture Notes in Computer Science 7089, Springer 2011, ISBN 978-3-642-25515-1
Invited Paper
- Antoine Amarilli
, David Naccache, Pablo Rauzy
, Emil Simion
:
Can a Program Reverse-Engineer Itself? 1-9
Homomorphic Encryption
- Peter Scholl
, Nigel P. Smart:
Improved Key Generation for Gentry's Fully Homomorphic Encryption Scheme. 10-22 - Frederik Armknecht
, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi:
On Constructing Homomorphic Encryption Schemes from Coding Theory. 23-40
Coding Theory I
- Matthew Geoffrey Parker, Constanza Riera:
Generalised Complementary Arrays. 41-60 - Jean-Pierre Flori, Sihem Mesnager, Gérard D. Cohen:
Binary Kloosterman Sums with Value 4. 61-78 - Vincent Herbert, Sumanta Sarkar:
On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2 i + 1, 2 j + 1}. 79-96
Knowledge Proof
- Kun Peng:
A Secure and Efficient Proof of Integer in an Interval Range. 97-111 - Junji Shikata, Daisuke Yamanaka:
Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction. 112-131
Cryptographic Functions
- Go Yamamoto, Tetsutaro Kobayashi:
Self-correctors for Cryptographic Modules. 132-151 - Elena Andreeva
, Martijn Stam:
The Symbiosis between Collision and Preimage Resistance. 152-171 - Marc Mouffron, Guillaume Vergne:
Enhanced Count of Balanced Symmetric Functions and Balanced Alternating Functions. 172-189
Public Key Cryptosystem
- Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai, Kazuo Ohta:
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting. 190-209 - Yuki Shibuya, Junji Shikata:
Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity. 210-229
Coding Theory II
- Delphine Boucher
, Felix Ulmer:
A Note on the Dual Codes of Module Skew Codes. 230-243 - Daniel Augot, Morgan Barbier, Caroline Fontaine:
Ensuring Message Embedding in Wet Paper Steganography. 244-258 - Alex J. Burrage, Ana Salagean
, Raphael C.-W. Phan
:
On the Stability of m-Sequences. 259-274
Pairing and ECC Implementation
- Diego F. Aranha
, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez:
Parallelizing the Weil and Tate Pairings. 275-295 - Michael Scott:
On the Efficient Implementation of Pairing-Based Protocols. 296-308 - Xusheng Zhang, Dongdai Lin:
Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2. 309-326 - Duc-Phong Le
, Chik How Tan:
Improved Precomputation Scheme for Scalar Multiplication on Elliptic Curves. 327-343
Security Analysis
- Martin R. Albrecht, Kenneth G. Paterson:
Breaking an Identity-Based Encryption Scheme Based on DHIES. 344-355 - Stephen C. Williams:
Analysis of the SSH Key Exchange Protocol. 356-374 - Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner, Mathieu David:
Cryptanalysis of the Light-Weight Cipher A2U2. 375-390
Symmetric Key Cryptosystem
- Kazuhiko Minematsu, Tetsu Iwata:
Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal. 391-412 - Yasushi Osaki, Tetsu Iwata:
Security of Hash-then-CBC Key Wrapping Revisited. 413-430
Cryptographic Protocols
- Malika Izabachène, Benoît Libert, Damien Vergnaud
:
Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes. 431-450 - Colin Boyd, Juanma González Nieto:
On Forward Secrecy in One-Round Key Exchange. 451-468 - Guilin Wang, Fubiao Xia, Yunlei Zhao:
Designated Confirmer Signatures with Unified Verification. 469-495

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.