Normal view MARC view ISBD view

Cryptography and Coding [electronic resource] : 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019, Proceedings / edited by Martin Albrecht.

Contributor(s): Albrecht, Martin [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 11929Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019.Description: VIII, 367 p. 659 illus., 20 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030351991.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Computer engineering | Computer networks  | Application software | Software engineering | Cryptology | Data and Information Security | Computer Engineering and Networks | Computer and Information Systems Applications | Software EngineeringAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing -- Decryption Algorithm Substitution Attacks -- Subversion-Resistant Simulation (Knowledge) Sound NIZKs -- Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2 -- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange -- Efficient Fully Secure Leakage-Deterring Encryption -- Sharing the LUOV: Threshold Post-Quantum Signatures -- Commodity-Based 2PC for Arithmetic Circuits -- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions -- Forgery Attacks on FlexAE and FlexAEAD -- Key Recovery Attacks on Some Rank Metric Code-based Signatures -- On the Security of Multikey Homomorphic Encryption -- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations -- Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data -- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes -- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model -- Distributing any Elliptic Curve Based Protocol.
In: Springer Nature eBookSummary: This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.
    average rating: 0.0 (0 votes)
No physical items for this record

A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing -- Decryption Algorithm Substitution Attacks -- Subversion-Resistant Simulation (Knowledge) Sound NIZKs -- Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2 -- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange -- Efficient Fully Secure Leakage-Deterring Encryption -- Sharing the LUOV: Threshold Post-Quantum Signatures -- Commodity-Based 2PC for Arithmetic Circuits -- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions -- Forgery Attacks on FlexAE and FlexAEAD -- Key Recovery Attacks on Some Rank Metric Code-based Signatures -- On the Security of Multikey Homomorphic Encryption -- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations -- Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data -- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes -- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model -- Distributing any Elliptic Curve Based Protocol.

This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

There are no comments for this item.

Log in to your account to post a comment.