Cryptography and Coding

14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings

  • Martijn Stam
Conference proceedings IMACC 2013

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8308)

Table of contents

  1. Front Matter
  2. Bits and Booleans

    1. Sihem Mesnager
      Pages 1-15
    2. David Gardner, Ana Sălăgean, Raphael C. -W. Phan
      Pages 16-27
  3. Homomorphic Encryption

    1. Joppe W. Bos, Kristin Lauter, Jake Loftus, Michael Naehrig
      Pages 45-64
    2. Joël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro et al.
      Pages 65-84
  4. Codes and Applications

    1. Gérard D. Cohen, Sihem Mesnager, Alain Patey
      Pages 85-98
    2. Carlos Aguilar-Melchor, Slim Bettaieb, Philippe Gaborit, Julien Schrek
      Pages 99-119
  5. Cryptanalysis

    1. Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 141-157
    2. Pierre-Alain Fouque, Mehdi Tibouchi, Jean-Christophe Zapalowicz
      Pages 158-172
  6. Protecting against Leakage

    1. Guilhem Castagnos, Soline Renner, Gilles Zémor
      Pages 193-212
  7. Hash Functions

    1. Hidenori Kuwakado, Shoichi Hirose
      Pages 213-231
    2. Pierre-Alain Fouque, Pierre Karpman
      Pages 252-269
  8. Key Issues

    1. Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob I. Pagter
      Pages 270-289
    2. Joop van de Pol, Nigel P. Smart
      Pages 290-303
  9. Public Key Primitives

  10. Back Matter

About these proceedings


This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December 2013. The 20 papers presented were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: bits and booleans; homomorphic encryption; codes and applications; cryptanalysis; protecting against leakage; hash functions; key issues and public key primitives.


cloud cryptography cryptanalysis homomorphic encryption provable security secure multiparty computation

Editors and affiliations

  • Martijn Stam
    • 1
  1. 1.Dept. of Computer ScienceUniversity of BristolBristolUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-45238-3
  • Online ISBN 978-3-642-45239-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software