default search action
18th IMACC 2021: Virtual Event
- Maura B. Paterson:
Cryptography and Coding - 18th IMA International Conference, IMACC 2021, Virtual Event, December 14-15, 2021, Proceedings. Lecture Notes in Computer Science 13129, Springer 2021, ISBN 978-3-030-92640-3
Applications of Codes
- Travis Baumbaugh, Haley Colgate, Tim Jackman, Felice Manganiello:
Batch Codes from Affine Cartesian Codes and Quotient Spaces. 3-15 - Vlad-Florin Dragoi, Andreea Szocs:
Structural Properties of Self-dual Monomial Codes with Application to Code-Based Cryptography. 16-41
Cryptanalysis
- Nicolas Aragon, Maxime Bros, Philippe Gaborit:
Cryptanalysis of the Rank Preserving Signature. 45-58 - Srinivas Vivek:
Attacks on a Privacy-Preserving Publish-Subscribe System and a Ride-Hailing Service. 59-71
Encryption Schemes
- Hans Heum, Martijn Stam:
Tightness Subtleties for Multi-user PKE Notions. 75-104 - Hirokazu Kobayashi, Yohei Watanabe, Junji Shikata:
Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication. 105-128 - Kelong Cong, Karim Eldefrawy, Nigel P. Smart:
Optimizing Registration Based Encryption. 129-157
Hash Functions
- Shoichi Hirose, Hidenori Kuwakado:
A Note on Quantum Collision Resistance of Double-Block-Length Compression Functions. 161-175
Isogeny-Based Cryptography
- Karim Baghery, Daniele Cozzo, Robi Pedersen:
An Isogeny-Based ID Protocol Using Structured Public Keys. 179-197
Lattice-Based Cryptography
- Satoshi Nakamura, Masaya Yasuda:
An Extension of Kannan's Embedding for Solving Ring-Based LWE Problems. 201-219 - Sebastian H. Faller, Pascal Baumer, Michael Klooß, Alexander Koch, Astrid Ottenhues, Markus Raiber:
Black-Box Accumulation Based on Lattices. 220-246 - Elena Kirshanova, Alexander May:
How to Find Ternary LWE Keys Using Locality Sensitive Hashing. 247-264 - Hao Chen, Ilia Iliashenko, Kim Laine:
When HEAAN Meets FV: A New Somewhat Homomorphic Encryption with Reduced Memory Overhead. 265-285
Multiparty Computation
- Jiahui Liu, Satyanarayana Vusirikala:
Secure Multiparty Computation in the Bounded Storage Model. 289-325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.