Advertisement

© 2015

Cryptography and Coding

15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings

  • Jens Groth
Conference proceedings IMACC 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9496)

Also part of the Security and Cryptology book sub series (LNSC, volume 9496)

Table of contents

  1. Front Matter
    Pages I-X
  2. Invited Paper

    1. Front Matter
      Pages 1-1
    2. Sihem Mesnager, Gérard Cohen, David Madore
      Pages 3-19
  3. Best Paper Award

    1. Front Matter
      Pages 21-21
    2. Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee
      Pages 23-40
  4. Authentication

    1. Front Matter
      Pages 41-41
    2. Wenbin Zhang, Chik How Tan
      Pages 43-56
    3. David Derler, Christian Hanser, Daniel Slamanig
      Pages 57-74
  5. Symmetric Cryptography

    1. Front Matter
      Pages 75-75
    2. Kazuhiko Minematsu, Tetsu Iwata
      Pages 77-93
    3. Guy Barwell, Daniel Page, Martijn Stam
      Pages 94-111
    4. Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
      Pages 112-129
  6. 2-Party Computation

  7. Codes

    1. Front Matter
      Pages 171-171
    2. Monica C. Liberatori, Leonardo J. Arnone, Jorge Castiñeira Moreira, Patrick G. Farrell
      Pages 173-183
    3. Grigory Kabatiansky, Serge Vlǎduţ, Cedric Tavernier
      Pages 184-189
  8. Boolean Functions

    1. Front Matter
      Pages 203-203

About these proceedings

Introduction

This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.

Keywords

Authentication Cryptography Information theory Provable security Security Anonymous credentials Bent functions Boolean functions Coding theory Cryptanalysis Digital signatures Encryption Entropy Error correction Higher order differentiation Lattices Leakage resilience Multi-party computation Side-channel attacks Zero-knowledge proofs

Editors and affiliations

  • Jens Groth
    • 1
  1. 1.University College LondonCambridgeUnited Kingdom

Bibliographic information

Industry Sectors
Pharma
Automotive
Biotechnology
IT & Software
Telecommunications
Law
Aerospace
Engineering
Finance, Business & Banking
Electronics