Cryptography and coding : 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019 : proceedings
Author(s)
Bibliographic Information
Cryptography and coding : 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019 : proceedings
(Lecture notes in computer science, 11929 . LNCS sublibrary ; SL 4 . Security and cryptology)
Springer, c2019
Available at 1 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references and index
Description and Table of Contents
Description
This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.
Table of Contents
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.- Decryption Algorithm Substitution Attacks.- Subversion-Resistant Simulation (Knowledge) Sound NIZKs.- Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2.- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange.- Efficient Fully Secure Leakage-Deterring Encryption.- Sharing the LUOV: Threshold Post-Quantum Signatures.- Commodity-Based 2PC for Arithmetic Circuits.- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions.- Forgery Attacks on FlexAE and FlexAEAD.- Key Recovery Attacks on Some Rank Metric Code-based Signatures.- On the Security of Multikey Homomorphic Encryption.- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations.- Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data.- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes.- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model.- Distributing any Elliptic Curve Based Protocol.
by "Nielsen BookData"