default search action
16th IMACC 2017: Oxford, UK
- Máire O'Neill:
Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings. Lecture Notes in Computer Science 10655, Springer 2017, ISBN 978-3-319-71044-0
Order Revealing Encryption
- Helene Haagh, Yue Ji, Chenxing Li, Claudio Orlandi, Yifan Song:
Revealing Encryption for Partial Ordering. 3-22
Homomorphic Encryption and Secure Computation
- Ryo Hiromasa, Yutaka Kawai:
Dynamic Multi Target Homomorphic Attribute-Based Encryption. 25-43 - James Dyer, Martin E. Dyer, Jie Xu:
Practical Homomorphic Encryption Over the Integers for Secure Computation in the Cloud. 44-76 - Peter Scholl, Nigel P. Smart, Tim Wood:
When It's All Just Too Much: Outsourcing MPC-Preprocessing. 77-99
Coding Theory
- Marco Frego:
On the Probability of Incorrect Decoding for Linear Codes. 103-115 - Han Zhang:
Improvement on Minimum Distance of Symbol-Pair Codes. 116-124
Bilinear and Multilinear Maps
- Ayan Mahalanobis, Pralhad Shinde:
Bilinear Cryptography Using Groups of Nilpotency Class 2. 127-134 - Martin R. Albrecht, Alex Davidson, Enrique Larraia:
Notes on GGH13 Without the Presence of Ideals. 135-158
Signatures
- Ali El Kaafarani, Essam Ghadafi:
Attribute-Based Signatures with User-Controlled Linkability Without Random Oracles. 161-184 - Essam Ghadafi:
How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors. 185-204
Post-Quantum Cryptography
- Paulo S. L. M. Barreto, Shay Gueron, Tim Güneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier, Jean-Pierre Tillich:
CAKE: Code-Based Algorithm for Key Encapsulation. 207-226 - Sarah McCarthy, Neil Smyth, Elizabeth O'Sullivan:
A Practical Implementation of Identity-Based Encryption Over NTRU Lattices. 227-246 - Michael Scott:
A Note on the Implementation of the Number Theoretic Transform. 247-258
Homomorphic Signatures
- Lucas Schabhüser, Johannes Buchmann, Patrick Struck:
A Linearly Homomorphic Signature Scheme from Weaker Assumptions. 261-279 - Essam Ghadafi:
Subset Signatures with Controlled Context-Hiding. 280-304
Symmetric Cryptography
- Chik How Tan, Theo Fanuela Prabowo:
Orthogonal MDS Diffusion Matrices over Galois Rings. 307-330
Cryptanalysis
- Raghvendra Rohit, Riham AlTawy, Guang Gong:
MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher. 333-351 - Thierry Mefenza, Damien Vergnaud:
Lattice Attacks on Pairing-Based Signatures. 352-370 - Taechan Kim, Changmin Lee:
Lattice Reductions over Euclidean Rings with Applications to Cryptanalysis. 371-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.