


default search action
18th IMACC 2021: Virtual Event
- Maura B. Paterson
:
Cryptography and Coding - 18th IMA International Conference, IMACC 2021, Virtual Event, December 14-15, 2021, Proceedings. Lecture Notes in Computer Science 13129, Springer 2021, ISBN 978-3-030-92640-3
Applications of Codes
- Travis Baumbaugh, Haley Colgate, Tim Jackman
, Felice Manganiello
:
Batch Codes from Affine Cartesian Codes and Quotient Spaces. 3-15 - Vlad-Florin Dragoi
, Andreea Szocs
:
Structural Properties of Self-dual Monomial Codes with Application to Code-Based Cryptography. 16-41
Cryptanalysis
- Nicolas Aragon, Maxime Bros
, Philippe Gaborit:
Cryptanalysis of the Rank Preserving Signature. 45-58 - Srinivas Vivek
:
Attacks on a Privacy-Preserving Publish-Subscribe System and a Ride-Hailing Service. 59-71
Encryption Schemes
- Hans Heum
, Martijn Stam
:
Tightness Subtleties for Multi-user PKE Notions. 75-104 - Hirokazu Kobayashi, Yohei Watanabe, Junji Shikata:
Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication. 105-128 - Kelong Cong
, Karim Eldefrawy
, Nigel P. Smart
:
Optimizing Registration Based Encryption. 129-157
Hash Functions
- Shoichi Hirose
, Hidenori Kuwakado:
A Note on Quantum Collision Resistance of Double-Block-Length Compression Functions. 161-175
Isogeny-Based Cryptography
- Karim Baghery
, Daniele Cozzo, Robi Pedersen
:
An Isogeny-Based ID Protocol Using Structured Public Keys. 179-197
Lattice-Based Cryptography
- Satoshi Nakamura, Masaya Yasuda:
An Extension of Kannan's Embedding for Solving Ring-Based LWE Problems. 201-219 - Sebastian H. Faller, Pascal Baumer, Michael Klooß
, Alexander Koch
, Astrid Ottenhues
, Markus Raiber
:
Black-Box Accumulation Based on Lattices. 220-246 - Elena Kirshanova
, Alexander May
:
How to Find Ternary LWE Keys Using Locality Sensitive Hashing. 247-264 - Hao Chen, Ilia Iliashenko, Kim Laine:
When HEAAN Meets FV: A New Somewhat Homomorphic Encryption with Reduced Memory Overhead. 265-285
Multiparty Computation
- Jiahui Liu, Satyanarayana Vusirikala:
Secure Multiparty Computation in the Bounded Storage Model. 289-325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.