IMACC C

30 papers

YearTitle / Authors
2005A General Construction for Simultaneous Signing and Encrypting.
John Malone-Lee
2005A Key Encapsulation Mechanism for NTRU.
Martijn Stam
2005A Trellis-Based Bound on (2, 1)-Separating Codes.
Hans Georg Schaathun, Gérard D. Cohen
2005Abstract Models of Computation in Cryptography.
Ueli M. Maurer
2005An Algebraic Framework for Cipher Embeddings.
Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
2005Complexity Estimates for the F
Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin
2005Concrete Security of the Blum-Blum-Shub Pseudorandom Generator.
Andrey Sidorenko, Berry Schoenmakers
2005Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings
Nigel P. Smart
2005Domain Expansion of MACs: Alternative Uses of the FIL-MAC.
Ueli M. Maurer, Johan Sjödin
2005Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods.
Mustapha Hedabou
2005Efficient Identity-Based Key Encapsulation to Multiple Parties.
Manuel Barbosa, Pooya Farshim
2005Exploiting Coding Theory for Collision Attacks on SHA-1.
Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
2005Generalized Strong Extractors and Deterministic Privacy Amplification.
Robert König, Ueli M. Maurer
2005Hash Based Digital Signature Schemes.
C. Dods, Nigel P. Smart, Martijn Stam
2005Improved Decoding of Interleaved AG Codes.
Andrew Brown, Lorenz Minder, Amin Shokrollahi
2005Non-interactive Designated Verifier Proofs and Undeniable Signatures.
Caroline Kudla, Kenneth G. Paterson
2005Normality of Vectorial Functions.
An Braeken, Christopher Wolf, Bart Preneel
2005On Threshold Self-healing Key Distribution Schemes.
Germán Sáez
2005On the Automatic Construction of Indistinguishable Operations.
Manuel Barbosa, Dan Page
2005Pairing-Based Cryptography at High Security Levels.
Neal Koblitz, Alfred Menezes
2005Pairings on Elliptic Curves over Finite Commutative Rings.
Steven D. Galbraith, James F. McKee
2005Partial Key Recovery Attacks on XCBC, TMAC and OMAC.
Chris J. Mitchell
2005Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics.
Woo Tae Kim, Se H. Kang, Eon Kyeong Joo
2005Probabilistic Algebraic Attacks.
An Braeken, Bart Preneel
2005Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.
Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon
2005Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme.
Liqun Chen, Zhaohui Cheng
2005Tessellation Based Multiple Description Coding.
Canhui Cai, Jing Chen
2005The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited.
Kamel Bentahar
2005The Physically Observable Security of Signature Schemes.
Alexander W. Dent, John Malone-Lee
2005Unconditionally Secure Information Authentication in Presence of Erasures.
Goce Jakimoski