Update cookies preferences

E-book: Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings

Edited by
  • Format: PDF+DRM
  • Series: Lecture Notes in Computer Science 7089
  • Pub. Date: 08-Dec-2011
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783642255168
  • Format - PDF+DRM
  • Price: 55,56 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: PDF+DRM
  • Series: Lecture Notes in Computer Science 7089
  • Pub. Date: 08-Dec-2011
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Language: eng
  • ISBN-13: 9783642255168

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011. The 27 revised full papers presented together with one invited contribution were carefully reviewed and selected from 57 submissions. The papers cover a wide range of topics in the field of mathematics and computer science, including coding theory, homomorphic encryption, symmetric and public key cryptosystems, cryptographic functions and protocols, efficient pairing and scalar multiplication implementation, knowledge proof, and security analysis.
Invited Paper
Can a Program Reverse-Engineer Itself?
1(9)
Antoine Amarilli
David Naccache
Pablo Rauzy
Emil Simion
Homomorphic Encryption
Improved Key Generation for Gentry's Fully Homomorphic Encryption Scheme
10(13)
Peter Scholl
Nigel P. Smart
On Constructing Homomorphic Encryption Schemes from Coding Theory
23(18)
Frederik Armknecht
Daniel Augot
Ludovic Perret
Ahmad-Reza Sadeghi
Coding Theory I
Generalised Complementary Arrays
41(20)
Matthew G. Parker
Constanza Riera
Binary Kloosterman Sums with Value 4
61(18)
Jean-Pierre Flori
Sihem Mesnager
Gerard Cohen
On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2i + 1, 2j + 1}
79(18)
Vincent Herbert
Sumanta Sarkar
Knowledge Proof
A Secure and Efficient Proof of Integer in an Interval Range
97(15)
Kun Peng
Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction
112(20)
Junji Shikata
Daisuke Yamanaka
Cryptographic Functions
Self-correctors for Cryptographic Modules
132(20)
Go Yamamoto
Tetsutaro Kobayashi
The Symbiosis between Collision and Preimage Resistance
152(20)
Elena Andreeva
Martijn Stam
Enhanced Count of Balanced Symmetric Functions and Balanced Alternating Functions
172(18)
Marc Mouffron
Guillaume Vergne
Public Key Cryptosystem
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting
190(20)
Mitsuhiro Hattori
Takato Hirano
Takashi Ito
Nori Matsuda
Takumi Mori
Yusuke Sakai
Kazuo Ohta
Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity
210(20)
Yuki Shibuya
Junji Shikata
Coding Theory II
A Note on the Dual Codes of Module Skew Codes
230(14)
Delphine Boucher
Felix Ulmer
Ensuring Message Embedding in Wet Paper Steganography
244(15)
Daniel Augot
Morgan Barbier
Caroline Fontaine
On the Stability of m-Sequences
259(16)
Alex J. Burrage
Ana Salagean
Raphael C.-W. Phan
Pairing and ECC Implementation
Parallelizing the Weil and Tate Pairings
275(21)
Diego F. Aranha
Edward Knapp
Alfred Menezes
Francisco Rodriguez-Henriquez
On the Efficient Implementation of Pairing-Based Protocols
296(13)
Michael Scott
Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2
309(18)
Xusheng Zhang
Dongdai Lin
Improved Precomputation Scheme for Scalar Multiplication on Elliptic Curves
327(17)
Due-Phong Le
Chik How Tan
Security Analysis
Breaking an Identity-Based Encryption Scheme Based on DHIES
344(12)
Martin R. Albrecht
Kenneth G. Paterson
Analysis of the SSH Key Exchange Protocol
356(19)
Stephen C. Williams
Cryptanalysis of the Light-Weight Cipher A2U2
375(16)
Mohamed Ahmed Abdelraheem
Julia Borghoff
Erik Zenner
Mathieu David
Symmetric Key Cryptosystem
Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal
391(22)
Kazuhiko Minematsu
Tetsu Iwata
Security of Hash-then-CBC Key Wrapping Revisited
413(18)
Yasushi Osaki
Tetsu Iwata
Cryptographic Protocols
Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes
431(20)
Malika Izabachene
Benoit Libert
Damien Vergnaud
On Forward Secrecy in One-Round Key Exchange
451(18)
Colin Boyd
Juan Gonzalez Nieto
Designated Confirmer Signatures with Unified Verification
469(28)
Guilin Wang
Fubiao Xia
Yunlei Zhao
Author Index 497