Advertisement

Cryptography and Coding

15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings

  • Jens Groth
Conference proceedings IMACC 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9496)

Also part of the Security and Cryptology book sub series (LNSC, volume 9496)

Table of contents

  1. Front Matter
    Pages I-X
  2. Invited Paper

    1. Front Matter
      Pages 1-1
    2. Sihem Mesnager, Gérard Cohen, David Madore
      Pages 3-19
  3. Best Paper Award

    1. Front Matter
      Pages 21-21
    2. Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, Hoeteck Wee
      Pages 23-40
  4. Authentication

    1. Front Matter
      Pages 41-41
    2. Wenbin Zhang, Chik How Tan
      Pages 43-56
    3. David Derler, Christian Hanser, Daniel Slamanig
      Pages 57-74
  5. Symmetric Cryptography

    1. Front Matter
      Pages 75-75
    2. Kazuhiko Minematsu, Tetsu Iwata
      Pages 77-93
    3. Guy Barwell, Daniel Page, Martijn Stam
      Pages 94-111
    4. Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
      Pages 112-129
  6. 2-Party Computation

  7. Codes

    1. Front Matter
      Pages 171-171
    2. Monica C. Liberatori, Leonardo J. Arnone, Jorge Castiñeira Moreira, Patrick G. Farrell
      Pages 173-183
    3. Grigory Kabatiansky, Serge Vlǎduţ, Cedric Tavernier
      Pages 184-189
  8. Boolean Functions

    1. Front Matter
      Pages 203-203
    2. Neşe Koçak, Sihem Mesnager, Ferruh Özbudak
      Pages 205-224
    3. Richard Winter, Ana Salagean, Raphael C.-W. Phan
      Pages 225-238
    4. Jian Liu, Sihem Mesnager, Lusheng Chen
      Pages 239-253
  9. Information Theory

    1. Front Matter
      Pages 255-255
  10. Leakage Resilience

    1. Front Matter
      Pages 275-275
    2. Janaka Alawatugoda, Douglas Stebila, Colin Boyd
      Pages 277-294
    3. Daniel P. Martin, Elisabeth Oswald, Martijn Stam, Marcin Wójcik
      Pages 295-310
    4. Giuseppe Ateniese, Antonio Faonio, Seny Kamara
      Pages 311-328
  11. Back Matter
    Pages 329-329

About these proceedings

Introduction

This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.

Keywords

Authentication Cryptography Information theory Provable security Security Anonymous credentials Bent functions Boolean functions Coding theory Cryptanalysis Digital signatures Encryption Entropy Error correction Higher order differentiation Lattices Leakage resilience Multi-party computation Side-channel attacks Zero-knowledge proofs

Editors and affiliations

  • Jens Groth
    • 1
  1. 1.University College LondonCambridgeUnited Kingdom

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-27239-9
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-27238-2
  • Online ISBN 978-3-319-27239-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site