default search action
17th IMACC 2019: Oxford, UK
- Martin Albrecht:
Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019, Proceedings. Lecture Notes in Computer Science 11929, Springer 2019, ISBN 978-3-030-35198-4 - Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig:
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing. 1-21 - Marcel Armour, Bertram Poettering:
Subverting Decryption in AEAD. 22-41 - Karim Baghery:
Subversion-Resistant Simulation (Knowledge) Sound NIZKs. 42-63 - Rowena Alma L. Betty, Akihiro Munemasa:
Classification of Self-dual Codes of Length 20 over ℤ4 and Length at Most 18 over 𝔽2+u𝔽2. 64-77 - Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus:
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange. 78-101 - Jan Camenisch, Maria Dubovitskaya, Patrick Towa:
Efficient Fully Secure Leakage-Deterring Encryption. 102-127 - Daniele Cozzo, Nigel P. Smart:
Sharing the LUOV: Threshold Post-quantum Signatures. 128-153 - Ivan Damgård, Helene Haagh, Michael Nielsen, Claudio Orlandi:
Commodity-Based 2PC for Arithmetic Circuits. 154-177 - Claire Delaplace, Andre Esser, Alexander May:
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions. 178-199 - Maria Eichlseder, Daniel Kales, Markus Schofnegger:
Forgery Attacks on FlexAE and FlexAEAD. 200-214 - Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo:
Key Recovery Attacks on Some Rank Metric Code-Based Signatures. 215-235 - Hyang-Sook Lee, Jeongeun Park:
On the Security of Multikey Homomorphic Encryption. 236-251 - Ramiro Martínez, Paz Morillo:
RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative Relations. 252-277 - Shyam Murthy, Srinivas Vivek:
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data. 278-294 - Shingo Sato, Junji Shikata:
Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes. 295-316 - Shingo Sato, Junji Shikata:
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model. 317-341 - Nigel P. Smart, Younes Talibi Alaoui:
Distributing Any Elliptic Curve Based Protocol. 342-366
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.