Skip to main content
  • Conference proceedings
  • © 2009

Cryptography and Coding

12th IMA International Conference, IMACC 2009, Cirencester, UK, December 15-17, 2009, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5921)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IMACC: IMA International Conference on Cryptography and Coding

Conference proceedings info: IMACC 2009.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

  2. Coding Theory

    1. Subspace Codes

      • Azadeh Khaleghi, Danilo Silva, Frank R. Kschischang
      Pages 1-21
    2. Codes as Modules over Skew Polynomial Rings

      • Delphine Boucher, Felix Ulmer
      Pages 38-55
    3. On Higher Weights and Code Existence

      • Hans Georg Schaathun
      Pages 56-64
    4. Mass Formula for Even Codes over

      • Koichi Betsumiya, Rowena Alma L. Betty, Akihiro Munemasa
      Pages 65-77
    5. On the Classification of Self-dual -Codes

      • Masaaki Harada, Akihiro Munemasa
      Pages 78-90
    6. On Linear Codes from Maximal Curves

      • Stefania Fanali
      Pages 91-111
  3. Symmetric Cryptography

    1. On Linear Cryptanalysis with Many Linear Approximations

      • Benoît Gérard, Jean-Pierre Tillich
      Pages 112-132
    2. Bivium as a Mixed-Integer Linear Programming Problem

      • Julia Borghoff, Lars R. Knudsen, Mathias Stolpe
      Pages 133-152
    3. Security of Cyclic Double Block Length Hash Functions

      • Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 153-175
    4. Another Glance at Double-Length Hashing

      • Onur Özen, Martijn Stam
      Pages 176-201
  4. Security Protocols

    1. Provably Secure Code-Based Threshold Ring Signatures

      • Léonard Dallot, Damien Vergnaud
      Pages 222-235
    2. A New Protocol for the Nearby Friend Problem

      • Sanjit Chatterjee, Koray Karabina, Alfred Menezes
      Pages 236-251
    3. Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes

      • Hao Chen, San Ling, Carles Padró, Huaxiong Wang, Chaoping Xing
      Pages 263-277
    4. Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes

      • Nuttapong Attrapadung, Hideki Imai
      Pages 278-300
    5. Certificate-Free Attribute Authentication

      • Dalia Khader, Liqun Chen, James H. Davenport
      Pages 301-325
  5. Asymmetric Cryptography

    1. Comparing with RSA

      • Julien Cathalo, David Naccache, Jean-Jacques Quisquater
      Pages 326-335

About this book

This book constitutes the refereed proceedings of the 12th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2009. The 26 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on coding theory, symmetric cryptography, security protocols, asymmetric cryptography, Boolean functions and side channels and implementations.

Editors and Affiliations

  • The Selmer Centre Department of Informatics, University of Bergen, Bergen, Norway

    Matthew G. Parker

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access