Skip to main content
  • Conference proceedings
  • © 2007

Cryptography and Coding

11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4887)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IMACC: IMA International Conference on Cryptography and Coding

Conference proceedings info: Cryptography and Coding 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

  2. Invited Papers

    1. Galois Rings and Pseudo-random Sequences

      • Patrick Solé, Dmitrii Zinoviev
      Pages 16-33
  3. Signatures I

    1. Finding Invalid Signatures in Pairing-Based Batches

      • Laurie Law, Brian J. Matt
      Pages 34-53
    2. How to Forge a Time-Stamp Which Adobe’s Acrobat Accepts

      • Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka
      Pages 54-72
    3. Boolean Functions

      1. Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions
        • Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis
        Pages 73-91
      2. On the Walsh Spectrum of a New APN Function
        • Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire
        Pages 92-98
      3. Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
        • Juan M. E. Tapiador, John A. Clark, Julio C. Hernandez-Castro
        Pages 99-117
    4. Block Cipher Cryptanalysis

      1. Algebraic Cryptanalysis of the Data Encryption Standard
        • Nicolas T. Courtois, Gregory V. Bard
        Pages 152-169
    5. Side Channels

      1. Cryptographic Side-Channels from Low-Power Cache Memory
        • Philipp Grabher, Johann Großschädl, Daniel Page
        Pages 170-184
      2. New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
        • Onur Acıiçmez, Shay Gueron, Jean-Pierre Seifert
        Pages 185-203
    6. Public Key Encryption

      1. Efficient KEMs with Partial Message Recovery
        • Tor E. Bjørstad, Alex W. Dent, Nigel P. Smart
        Pages 233-256
      2. Randomness Reuse: Extensions and Improvements
        • Manuel Barbosa, Pooya Farshim
        Pages 257-276
      3. On the Connection Between Signcryption and One-Pass Key Establishment
        • M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
        Pages 277-301
    7. Curves

      1. Optimised Versions of the Ate and Twisted Ate Pairings
        • Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto
        Pages 302-312

Other Volumes

  1. Cryptography and Coding

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access