


default search action
19th IMACC 2023: London, UK
- Elizabeth A. Quaglia
:
Cryptography and Coding - 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings. Lecture Notes in Computer Science 14421, Springer 2024, ISBN 978-3-031-47817-8
Coding Theory
- Étienne Burle, Ayoub Otmani:
An Upper-Bound on the Decoding Failure Probability of the LRPC Decoder. 3-16 - Claude Carlet, Serge Feukoua, Ana Salagean:
Coset Leaders of the First Order Reed-Muller Codes in the Classes of Niho Functions and Threshold Functions. 17-33 - Andre Esser
:
Revisiting Nearest-Neighbor-Based Information Set Decoding. 34-54
Symmetric Cryptography: Constructions and Attacks
- Kento Tsuji, Tetsu Iwata:
Feistel Ciphers Based on a Single Primitive. 57-79 - Wenchang Zhou, Jiqiang Lu:
Rectangle Attacks on Reduced Versions of the FBC Block Cipher. 80-95
Zero-Knowledge Protocols
- Xuan-Thanh Do
, Dang Truong Mac
, Quoc-Huy Vu
:
zk-SNARKs from Codes with Rank Metrics. 99-119 - Cyprien Delpech de Saint Guilhem
, Ehsan Ebrahimi
, Barry Van Leeuwen
:
Zero-Knowledge Systems from MPC-in-the-Head and Oblivious Transfer. 120-136 - Lennart Braun
, Cyprien Delpech de Saint Guilhem
, Robin Jadoul
, Emmanuela Orsini
, Nigel P. Smart
, Titouan Tanguy
:
ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for $\mathbb {Z}_{2^k}$. 137-157
Digital Signature Schemes and Extensions
- Sermin Kocaman
, Younes Talibi Alaoui
:
Efficient Secure Two Party ECDSA. 161-180 - Colin Putman, Keith M. Martin
:
Selective Delegation of Attributes in Mercurial Signature Credentials. 181-196
Advances in Post-Quantum Cryptography
- Cong Ling, Andrew Mendelsohn
:
Middle-Products of Skew Polynomials and Learning with Errors. 199-219 - Shahla Atapoor
:
Identity-Based Threshold Signatures from Isogenies. 220-240
Cryptography in Practice: Analyses and Constructions
- Alessandro Melloni
, Martijn Stam
, Øyvind Ytrehus
:
Dynamic Security Aspects of Onion Routing. 243-262 - Nigel P. Smart
:
Practical and Efficient FHE-Based MPC. 263-283

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.