Skip to main content
  • Conference proceedings
  • © 2015

Cryptography and Coding

15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9496)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IMACC: IMA International Conference on Cryptography and Coding

Conference proceedings info: IMACC 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (19 papers)

  1. Front Matter

    Pages I-X
  2. Invited Paper

    1. Front Matter

      Pages 1-1
    2. On Existence (Based on an Arithmetical Problem) and Constructions of Bent Functions

      • Sihem Mesnager, Gérard Cohen, David Madore
      Pages 3-19
  3. Best Paper Award

    1. Front Matter

      Pages 21-21
    2. Security Against Related Randomness Attacks via Reconstructive Extractors

      • Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee
      Pages 23-40
  4. Authentication

    1. Front Matter

      Pages 41-41
    2. MI-T-HFE, A New Multivariate Signature Scheme

      • Wenbin Zhang, Chik How Tan
      Pages 43-56
    3. A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials

      • David Derler, Christian Hanser, Daniel Slamanig
      Pages 57-74
  5. Symmetric Cryptography

    1. Front Matter

      Pages 75-75
    2. Tweak-Length Extension for Tweakable Blockciphers

      • Kazuhiko Minematsu, Tetsu Iwata
      Pages 77-93
    3. Rogue Decryption Failures: Reconciling AE Robustness Notions

      • Guy Barwell, Daniel Page, Martijn Stam
      Pages 94-111
    4. Robust Authenticated Encryption and the Limits of Symmetric Cryptography

      • Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
      Pages 112-129
  6. 2-Party Computation

    1. Front Matter

      Pages 131-131
    2. Zero-Knowledge Interactive Proof Systems for New Lattice Problems

      • Claude Crépeau, Raza Ali Kazmi
      Pages 152-169
  7. Codes

    1. Front Matter

      Pages 171-171
    2. Soft Distance Metric Decoding of Polar Codes

      • Monica C. Liberatori, Leonardo J. Arnone, Jorge Castiñeira Moreira, Patrick G. Farrell
      Pages 173-183
    3. On the Doubly Sparse Compressed Sensing Problem

      • Grigory Kabatiansky, Serge VlÇŽduÅ£, Cedric Tavernier
      Pages 184-189
  8. Boolean Functions

    1. Front Matter

      Pages 203-203

About this book

This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.

Editors and Affiliations

  • University College London, Cambridge, United Kingdom

    Jens Groth

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access