Editors:
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9496)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): IMACC: IMA International Conference on Cryptography and Coding
Conference proceedings info: IMACC 2015.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (19 papers)
-
Front Matter
-
Invited Paper
-
Front Matter
-
-
Best Paper Award
-
Front Matter
-
-
Boolean Functions
-
Front Matter
-
About this book
Keywords
- Authentication
- Cryptography
- Information theory
- Provable security
- Security
- Anonymous credentials
- Bent functions
- Boolean functions
- Coding theory
- Cryptanalysis
- Digital signatures
- Encryption
- Entropy
- Error correction
- Higher order differentiation
- Lattices
- Leakage resilience
- Multi-party computation
- Side-channel attacks
- Zero-knowledge proofs
Editors and Affiliations
-
University College London, Cambridge, United Kingdom
Jens Groth
Bibliographic Information
Book Title: Cryptography and Coding
Book Subtitle: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings
Editors: Jens Groth
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-27239-9
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-27238-2Published: 20 November 2015
eBook ISBN: 978-3-319-27239-9Published: 07 December 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 329
Number of Illustrations: 42 illustrations in colour
Topics: Cryptology, Coding and Information Theory, Algorithm Analysis and Problem Complexity, Systems and Data Security, Discrete Mathematics in Computer Science