Cryptography and Coding: 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings

Author:   Martin Albrecht
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2019
Volume:   11929
ISBN:  

9783030351984


Pages:   367
Publication Date:   17 November 2019
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Cryptography and Coding: 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings


Add your own review!

Overview

This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

Full Product Details

Author:   Martin Albrecht
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2019
Volume:   11929
Weight:   0.575kg
ISBN:  

9783030351984


ISBN 10:   303035198
Pages:   367
Publication Date:   17 November 2019
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.- Decryption Algorithm Substitution Attacks.- Subversion-Resistant Simulation (Knowledge) Sound NIZKs.- Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2.- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange.- Efficient Fully Secure Leakage-Deterring Encryption.- Sharing the LUOV: Threshold Post-Quantum Signatures.- Commodity-Based 2PC for Arithmetic Circuits.- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions.- Forgery Attacks on FlexAE and FlexAEAD.- Key Recovery Attacks on Some Rank Metric Code-based Signatures.- On the Security of Multikey Homomorphic Encryption.- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations.- Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data.- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes.- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model.- Distributing any Elliptic Curve Based Protocol.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List