IMACC C

21 papers

YearTitle / Authors
2013A Code-Based Undeniable Signature Scheme.
Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Julien Schrek
2013A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme.
David Galindo, Srinivas Vivek
2013Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings.
Somindu C. Ramanna, Palash Sarkar
2013Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption.
Rintaro Nakano, Junji Shikata
2013Cryptography and Coding - 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
Martijn Stam
2013Differential Cryptanalysis of Keccak Variants.
Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer
2013Efficient Generation of Elementary Sequences.
David Gardner, Ana Salagean, Raphael C.-W. Phan
2013Estimating Key Sizes for High Dimensional Lattice-Based Systems.
Joop van de Pol, Nigel P. Smart
2013Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis.
James McLaughlin, John A. Clark
2013Hashing Mode Using a Lightweight Blockcipher.
Hidenori Kuwakado, Shoichi Hirose
2013High-order Masking by Using Coding Theory and Its Application to AES.
Guilhem Castagnos, Soline Renner, Gilles Zémor
2013Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme.
Joppe W. Bos, Kristin E. Lauter, Jake Loftus, Michael Naehrig
2013Indifferentiability of Double Length Compression Functions.
Bart Mennink
2013On Minimal and Quasi-minimal Linear Codes.
Gérard D. Cohen, Sihem Mesnager, Alain Patey
2013On the Homomorphic Computation of Symmetric Cryptographic Primitives.
Silvia Mella, Ruggero Susella
2013On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption.
Joël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro, David A. Wilson
2013Recovering Private Keys Generated with Weak PRNGs.
Pierre-Alain Fouque, Mehdi Tibouchi, Jean-Christophe Zapalowicz
2013Secure Key Management in the Cloud.
Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter
2013Security Amplification against Meet-in-the-Middle Attacks Using Whitening.
Pierre-Alain Fouque, Pierre Karpman
2013Semi-bent Functions from Oval Polynomials.
Sihem Mesnager
2013Sub-linear Blind Ring Signatures without Random Oracles.
Essam Ghadafi