Skip to main content
  • Conference proceedings
  • © 2013

Cryptography and Coding

14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8308)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IMACC: IMA International Conference on Cryptography and Coding

Conference proceedings info: IMACC 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

  2. Bits and Booleans

    1. Semi-bent Functions from Oval Polynomials

      • Sihem Mesnager
      Pages 1-15
    2. Efficient Generation of Elementary Sequences

      • David Gardner, Ana Sălăgean, Raphael C. -W. Phan
      Pages 16-27
  3. Homomorphic Encryption

    1. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme

      • Joppe W. Bos, Kristin Lauter, Jake Loftus, Michael Naehrig
      Pages 45-64
    2. On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption

      • Joël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro et al.
      Pages 65-84
  4. Codes and Applications

    1. On Minimal and Quasi-minimal Linear Codes

      • Gérard D. Cohen, Sihem Mesnager, Alain Patey
      Pages 85-98
    2. A Code-Based Undeniable Signature Scheme

      • Carlos Aguilar-Melchor, Slim Bettaieb, Philippe Gaborit, Julien Schrek
      Pages 99-119
  5. Cryptanalysis

    1. Differential Cryptanalysis of Keccak Variants

      • Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 141-157
    2. Recovering Private Keys Generated with Weak PRNGs

      • Pierre-Alain Fouque, Mehdi Tibouchi, Jean-Christophe Zapalowicz
      Pages 158-172
  6. Protecting against Leakage

    1. High-order Masking by Using Coding Theory and Its Application to AES

      • Guilhem Castagnos, Soline Renner, Gilles Zémor
      Pages 193-212
  7. Hash Functions

    1. Hashing Mode Using a Lightweight Blockcipher

      • Hidenori Kuwakado, Shoichi Hirose
      Pages 213-231
    2. Security Amplification against Meet-in-the-Middle Attacks Using Whitening

      • Pierre-Alain Fouque, Pierre Karpman
      Pages 252-269
  8. Key Issues

    1. Secure Key Management in the Cloud

      • Ivan DamgÃ¥rd, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob I. Pagter
      Pages 270-289
    2. Estimating Key Sizes for High Dimensional Lattice-Based Systems

      • Joop van de Pol, Nigel P. Smart
      Pages 290-303
  9. Public Key Primitives

About this book

This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December 2013. The 20 papers presented were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: bits and booleans; homomorphic encryption; codes and applications; cryptanalysis; protecting against leakage; hash functions; key issues and public key primitives.

Editors and Affiliations

  • Dept. of Computer Science, University of Bristol, Bristol, UK

    Martijn Stam

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access