


default search action
18th IMACC 2021: Virtual Event
- Maura B. Paterson

:
Cryptography and Coding - 18th IMA International Conference, IMACC 2021, Virtual Event, December 14-15, 2021, Proceedings. Lecture Notes in Computer Science 13129, Springer 2021, ISBN 978-3-030-92640-3
Applications of Codes
- Travis Baumbaugh, Haley Colgate, Tim Jackman

, Felice Manganiello
:
Batch Codes from Affine Cartesian Codes and Quotient Spaces. 3-15 - Vlad-Florin Dragoi

, Andreea Szocs
:
Structural Properties of Self-dual Monomial Codes with Application to Code-Based Cryptography. 16-41
Cryptanalysis
- Nicolas Aragon, Maxime Bros

, Philippe Gaborit:
Cryptanalysis of the Rank Preserving Signature. 45-58 - Srinivas Vivek

:
Attacks on a Privacy-Preserving Publish-Subscribe System and a Ride-Hailing Service. 59-71
Encryption Schemes
- Hans Heum

, Martijn Stam
:
Tightness Subtleties for Multi-user PKE Notions. 75-104 - Hirokazu Kobayashi, Yohei Watanabe, Junji Shikata:

Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication. 105-128 - Kelong Cong

, Karim Eldefrawy
, Nigel P. Smart
:
Optimizing Registration Based Encryption. 129-157
Hash Functions
- Shoichi Hirose

, Hidenori Kuwakado:
A Note on Quantum Collision Resistance of Double-Block-Length Compression Functions. 161-175
Isogeny-Based Cryptography
- Karim Baghery

, Daniele Cozzo, Robi Pedersen
:
An Isogeny-Based ID Protocol Using Structured Public Keys. 179-197
Lattice-Based Cryptography
- Satoshi Nakamura, Masaya Yasuda:

An Extension of Kannan's Embedding for Solving Ring-Based LWE Problems. 201-219 - Sebastian H. Faller, Pascal Baumer, Michael Klooß

, Alexander Koch
, Astrid Ottenhues
, Markus Raiber
:
Black-Box Accumulation Based on Lattices. 220-246 - Elena Kirshanova

, Alexander May
:
How to Find Ternary LWE Keys Using Locality Sensitive Hashing. 247-264 - Hao Chen, Ilia Iliashenko, Kim Laine:

When HEAAN Meets FV: A New Somewhat Homomorphic Encryption with Reduced Memory Overhead. 265-285
Multiparty Computation
- Jiahui Liu, Satyanarayana Vusirikala:

Secure Multiparty Computation in the Bounded Storage Model. 289-325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














