researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2009
2011
2013
2015
2017
2019
2021
2023
2024
Filter by Tag
OR
AND
NOT
1
algebra
analysis
caching
certification
classification
programming
protocol
rule-based
security
Filter by Author
[+]
OR
AND
NOT
1
Akihiro Munemasa
Alexander May 0001
Alfred Menezes
Ana Salagean
Chik-How Tan
Claudio Orlandi
Colin Boyd
Cyprien Delpech de Saint Guilhem
Damien Vergnaud
Daniel Augot
Daniel Slamanig
David Naccache
Essam Ghadafi
Gérard D. Cohen
Junji Shikata
Martijn Stam
Nigel P. Smart
Raphael C.-W. Phan
Sihem Mesnager
Tetsu Iwata
Filter by Top terms
[+]
OR
AND
NOT
1
attacks
codes
coding
conference
cryptanalysis
cryptography
december
efficient
encryption
functions
homomorphic
ima
international
key
linear
proceedings
scheme
secure
security
signatures
IMA Int. Conf. (ima)
Editions
Publications
Viewing Publication 1 - 100 from 167
2024
Cryptography and Coding - 19th IMA International Conference, IMACC 2023, London, UK, December 12-14, 2023, Proceedings
Elizabeth A. Quaglia
, editor,
Volume 14421 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
2023
Revisiting Nearest-Neighbor-Based Information Set Decoding
Andre Esser 0001
.
ima 2024
:
34-54
[doi]
Middle-Products of Skew Polynomials and Learning with Errors
Cong Ling 0001
,
Andrew Mendelsohn
.
ima 2024
:
199-219
[doi]
Identity-Based Threshold Signatures from Isogenies
Shahla Atapoor
.
ima 2024
:
220-240
[doi]
ZK-for-Z2K: MPC-in-the-Head Zero-Knowledge Proofs for $\mathbb {Z}_{2^k}$
Lennart Braun
,
Cyprien Delpech de Saint Guilhem
,
Robin Jadoul
,
Emmanuela Orsini
,
Nigel P. Smart
,
Titouan Tanguy
.
ima 2024
:
137-157
[doi]
Coset Leaders of the First Order Reed-Muller Codes in the Classes of Niho Functions and Threshold Functions
Claude Carlet
,
Serge Feukoua
,
Ana Salagean
.
ima 2024
:
17-33
[doi]
Zero-Knowledge Systems from MPC-in-the-Head and Oblivious Transfer
Cyprien Delpech de Saint Guilhem
,
Ehsan Ebrahimi
,
Barry Van Leeuwen
.
ima 2024
:
120-136
[doi]
zk-SNARKs from Codes with Rank Metrics
Xuan Thanh Do
,
Dang Truong Mac
,
Quoc Huy Vu
.
ima 2024
:
99-119
[doi]
Efficient Secure Two Party ECDSA
Sermin Kocaman
,
Younes Talibi Alaoui
.
ima 2024
:
161-180
[doi]
Dynamic Security Aspects of Onion Routing
Alessandro Melloni
,
Martijn Stam
,
Øyvind Ytrehus
.
ima 2024
:
243-262
[doi]
Selective Delegation of Attributes in Mercurial Signature Credentials
Colin Putman
,
Keith M. Martin
.
ima 2024
:
181-196
[doi]
Practical and Efficient FHE-Based MPC
Nigel P. Smart
.
ima 2024
:
263-283
[doi]
Feistel Ciphers Based on a Single Primitive
Kento Tsuji
,
Tetsu Iwata
.
ima 2024
:
57-79
[doi]
Rectangle Attacks on Reduced Versions of the FBC Block Cipher
Wenchang Zhou
,
Jiqiang Lu
.
ima 2024
:
80-95
[doi]
An Upper-Bound on the Decoding Failure Probability of the LRPC Decoder
Étienne Burle
,
Ayoub Otmani
.
ima 2024
:
3-16
[doi]
2021
Attacks on a Privacy-Preserving Publish-Subscribe System and a Ride-Hailing Service
Srinivas Vivek 0001
.
ima 2021
:
59-71
[doi]
An Extension of Kannan's Embedding for Solving Ring-Based LWE Problems
Satoshi Nakamura 0004
,
Masaya Yasuda
.
ima 2021
:
201-219
[doi]
When HEAAN Meets FV: A New Somewhat Homomorphic Encryption with Reduced Memory Overhead
Hao Chen 0030
,
Ilia Iliashenko
,
Kim Laine
.
ima 2021
:
265-285
[doi]
Cryptanalysis of the Rank Preserving Signature
Nicolas Aragon
,
Maxime Bros
,
Philippe Gaborit
.
ima 2021
:
45-58
[doi]
An Isogeny-Based ID Protocol Using Structured Public Keys
Karim Baghery
,
Daniele Cozzo
,
Robi Pedersen
.
ima 2021
:
179-197
[doi]
Batch Codes from Affine Cartesian Codes and Quotient Spaces
Travis Baumbaugh
,
Haley Colgate
,
Timothy Jackman
,
Felice Manganiello
.
ima 2021
:
3-15
[doi]
Optimizing Registration Based Encryption
Kelong Cong
,
Karim Eldefrawy
,
Nigel P. Smart
.
ima 2021
:
129-157
[doi]
Structural Properties of Self-dual Monomial Codes with Application to Code-Based Cryptography
Vlad-Florin Dragoi
,
Andreea Szocs
.
ima 2021
:
16-41
[doi]
Black-Box Accumulation Based on Lattices
Sebastian H. Faller
,
Pascal Baumer
,
Michael Klooß
,
Alexander Koch 0001
,
Astrid Ottenhues
,
Markus Raiber
.
ima 2021
:
220-246
[doi]
Tightness Subtleties for Multi-user PKE Notions
Hans Heum
,
Martijn Stam
.
ima 2021
:
75-104
[doi]
A Note on Quantum Collision Resistance of Double-Block-Length Compression Functions
Shoichi Hirose
,
Hidenori Kuwakado
.
ima 2021
:
161-175
[doi]
How to Find Ternary LWE Keys Using Locality Sensitive Hashing
Elena Kirshanova
,
Alexander May 0001
.
ima 2021
:
247-264
[doi]
Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication
Hirokazu Kobayashi
,
Yohei Watanabe 0001
,
Junji Shikata
.
ima 2021
:
105-128
[doi]
Secure Multiparty Computation in the Bounded Storage Model
Jiahui Liu
,
Satyanarayana Vusirikala
.
ima 2021
:
289-325
[doi]
Cryptography and Coding - 18th IMA International Conference, IMACC 2021, Virtual Event, December 14-15, 2021, Proceedings
Maura B. Paterson
, editor,
Volume 13129 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
2019
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange
Pedro Branco 0005
,
Jintai Ding
,
Manuel Goulão
,
Paulo Mateus
.
ima 2019
:
78-101
[doi]
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing
Behzad Abdolmaleki
,
Hamidreza Khoshakhlagh
,
Daniel Slamanig
.
ima 2019
:
1-21
[doi]
Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019, Proceedings
Martin Albrecht
, editor,
Volume 11929 of
Lecture Notes in Computer Science
, Springer,
2019.
[doi]
Subverting Decryption in AEAD
Marcel Armour
,
Bertram Poettering
.
ima 2019
:
22-41
[doi]
Subversion-Resistant Simulation (Knowledge) Sound NIZKs
Karim Baghery
.
ima 2019
:
42-63
[doi]
2
Rowena Alma L. Betty
,
Akihiro Munemasa
.
ima 2019
:
64-77
[doi]
Efficient Fully Secure Leakage-Deterring Encryption
Jan Camenisch
,
Maria Dubovitskaya
,
Patrick Towa
.
ima 2019
:
102-127
[doi]
Sharing the LUOV: Threshold Post-quantum Signatures
Daniele Cozzo
,
Nigel P. Smart
.
ima 2019
:
128-153
[doi]
Commodity-Based 2PC for Arithmetic Circuits
Ivan Damgård
,
Helene Haagh
,
Michael Nielsen 0001
,
Claudio Orlandi
.
ima 2019
:
154-177
[doi]
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions
Claire Delaplace
,
Andre Esser
,
Alexander May 0001
.
ima 2019
:
178-199
[doi]
Forgery Attacks on FlexAE and FlexAEAD
Maria Eichlseder
,
Daniel Kales
,
Markus Schofnegger
.
ima 2019
:
200-214
[doi]
Key Recovery Attacks on Some Rank Metric Code-Based Signatures
Terry Shue Chien Lau
,
Chik-How Tan
,
Theo Fanuela Prabowo
.
ima 2019
:
215-235
[doi]
On the Security of Multikey Homomorphic Encryption
Hyang-Sook Lee
,
Jeongeun Park
.
ima 2019
:
236-251
[doi]
RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative Relations
Ramiro Martínez
,
Paz Morillo
.
ima 2019
:
252-277
[doi]
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data
Shyam Murthy
,
Srinivas Vivek
.
ima 2019
:
278-294
[doi]
Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes
Shingo Sato
,
Junji Shikata
.
ima 2019
:
295-316
[doi]
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model
Shingo Sato
,
Junji Shikata
.
ima 2019
:
317-341
[doi]
Distributing Any Elliptic Curve Based Protocol
Nigel P. Smart
,
Younes Talibi Alaoui
.
ima 2019
:
342-366
[doi]
2017
Notes on GGH13 Without the Presence of Ideals
Martin R. Albrecht
,
Alex Davidson
,
Enrique Larraia
.
ima 2017
:
135-158
[doi]
CAKE: Code-Based Algorithm for Key Encapsulation
Paulo S. L. M. Barreto
,
Shay Gueron
,
Tim Güneysu
,
Rafael Misoczki
,
Edoardo Persichetti
,
Nicolas Sendrier
,
Jean-Pierre Tillich
.
ima 2017
:
207-226
[doi]
Practical Homomorphic Encryption Over the Integers for Secure Computation in the Cloud
James Dyer
,
Martin Dyer
,
Jie Xu
.
ima 2017
:
44-76
[doi]
On the Probability of Incorrect Decoding for Linear Codes
Marco Frego
.
ima 2017
:
103-115
[doi]
How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors
Essam Ghadafi
.
ima 2017
:
185-204
[doi]
Subset Signatures with Controlled Context-Hiding
Essam Ghadafi
.
ima 2017
:
280-304
[doi]
Revealing Encryption for Partial Ordering
Helene Haagh
,
Yue Ji
,
Chenxing Li
,
Claudio Orlandi
,
Yifan Song
.
ima 2017
:
3-22
[doi]
Dynamic Multi Target Homomorphic Attribute-Based Encryption
Ryo Hiromasa
,
Yutaka Kawai
.
ima 2017
:
25-43
[doi]
Attribute-Based Signatures with User-Controlled Linkability Without Random Oracles
Ali El Kaafarani
,
Essam Ghadafi
.
ima 2017
:
161-184
[doi]
Lattice Reductions over Euclidean Rings with Applications to Cryptanalysis
Taechan Kim
,
Changmin Lee
.
ima 2017
:
371-391
[doi]
Bilinear Cryptography Using Groups of Nilpotency Class 2
Ayan Mahalanobis
,
Pralhad Shinde
.
ima 2017
:
127-134
[doi]
A Practical Implementation of Identity-Based Encryption Over NTRU Lattices
Sarah McCarthy
,
Neil Smyth
,
Elizabeth O'Sullivan
.
ima 2017
:
227-246
[doi]
Lattice Attacks on Pairing-Based Signatures
Thierry Mefenza
,
Damien Vergnaud
.
ima 2017
:
352-370
[doi]
Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings
Máire O'Neill
, editor,
Volume 10655 of
Lecture Notes in Computer Science
, Springer,
2017.
[doi]
MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher
Raghvendra Rohit
,
Riham AlTawy
,
Guang Gong
.
ima 2017
:
333-351
[doi]
A Linearly Homomorphic Signature Scheme from Weaker Assumptions
Lucas Schabhüser
,
Johannes A. Buchmann
,
Patrick Struck
.
ima 2017
:
261-279
[doi]
When It's All Just Too Much: Outsourcing MPC-Preprocessing
Peter Scholl
,
Nigel P. Smart
,
Tim Wood
.
ima 2017
:
77-99
[doi]
A Note on the Implementation of the Number Theoretic Transform
Michael Scott
.
ima 2017
:
247-258
[doi]
Orthogonal MDS Diffusion Matrices over Galois Rings
Chik-How Tan
,
Theo Fanuela Prabowo
.
ima 2017
:
307-330
[doi]
Improvement on Minimum Distance of Symbol-Pair Codes
Han Zhang
.
ima 2017
:
116-124
[doi]
2015
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange
Janaka Alawatugoda
,
Douglas Stebila
,
Colin Boyd
.
ima 2015
:
277-294
[doi]
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese
,
Antonio Faonio
,
Seny Kamara
.
ima 2015
:
311-328
[doi]
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Christian Badertscher
,
Christian Matt 0002
,
Ueli Maurer
,
Phillip Rogaway
,
Björn Tackmann
.
ima 2015
:
112-129
[doi]
Rogue Decryption Failures: Reconciling AE Robustness Notions
Guy Barwell
,
Daniel Page
,
Martijn Stam
.
ima 2015
:
94-111
[doi]
Zero-Knowledge Interactive Proof Systems for New Lattice Problems
Claude Crépeau
,
Raza Ali Kazmi
.
ima 2015
:
152-169
[doi]
A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials
David Derler
,
Christian Hanser
,
Daniel Slamanig
.
ima 2015
:
57-74
[doi]
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
Shota Goto
,
Junji Shikata
.
ima 2015
:
133-151
[doi]
Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings
Jens Groth
, editor,
Volume 9496 of
Lecture Notes in Computer Science
, Springer,
2015.
[doi]
On the Doubly Sparse Compressed Sensing Problem
Grigory Kabatiansky
,
Serge G. Vladut
,
Cédric Tavernier
.
ima 2015
:
184-189
[doi]
Codes of Length 2 Correcting Single Errors of Limited Size
Torleiv Kløve
.
ima 2015
:
190-201
[doi]
Bent and Semi-bent Functions via Linear Translators
Nese Koçak
,
Sihem Mesnager
,
Ferruh Özbudak
.
ima 2015
:
205-224
[doi]
Soft Distance Metric Decoding of Polar Codes
Mónica C. Liberatori
,
Leonardo J. Arnone
,
Jorge Castiñeira Moreira
,
Patrick Guy Farrell
.
ima 2015
:
173-183
[doi]
On the Diffusion Property of Iterated Functions
Jian Liu
,
Sihem Mesnager
,
Lusheng Chen
.
ima 2015
:
239-253
[doi]
A Leakage Resilient MAC
Daniel P. Martin
,
Elisabeth Oswald
,
Martijn Stam
,
Marcin Wójcik
.
ima 2015
:
295-310
[doi]
On Existence (Based on an Arithmetical Problem) and Constructions of Bent Functions
Sihem Mesnager
,
Gérard D. Cohen
,
David Madore
.
ima 2015
:
3-19
[doi]
Tweak-Length Extension for Tweakable Blockciphers
Kazuhiko Minematsu
,
Tetsu Iwata
.
ima 2015
:
77-93
[doi]
Security Against Related Randomness Attacks via Reconstructive Extractors
Kenneth G. Paterson
,
Jacob C. N. Schuldt
,
Dale L. Sibborn
,
Hoeteck Wee
.
ima 2015
:
23-40
[doi]
Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint
Maciej Skórski
.
ima 2015
:
257-274
[doi]
Comparison of Cube Attacks Over Different Vector Spaces
Richard Winter
,
Ana Salagean
,
Raphael C.-W. Phan
.
ima 2015
:
225-238
[doi]
MI-T-HFE, A New Multivariate Signature Scheme
Wenbin Zhang
,
Chik-How Tan
.
ima 2015
:
43-56
[doi]
2013
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
Joppe W. Bos
,
Kristin Lauter
,
Jake Loftus
,
Michael Naehrig
.
ima 2013
:
45-64
[doi]
High-order Masking by Using Coding Theory and Its Application to AES
Guilhem Castagnos
,
Soline Renner
,
Gilles Zémor
.
ima 2013
:
193-212
[doi]
A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme
David Galindo
,
Srinivas Vivek
.
ima 2013
:
173-192
[doi]
Sub-linear Blind Ring Signatures without Random Oracles
Essam Ghadafi
.
ima 2013
:
304-323
[doi]
Hashing Mode Using a Lightweight Blockcipher
Hidenori Kuwakado
,
Shoichi Hirose
.
ima 2013
:
213-231
[doi]
Differential Cryptanalysis of Keccak Variants
Stefan Kölbl
,
Florian Mendel
,
Tomislav Nad
,
Martin Schläffer
.
ima 2013
:
141-157
[doi]
Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis
James McLaughlin
,
John A. Clark
.
ima 2013
:
120-140
[doi]
A Code-Based Undeniable Signature Scheme
Carlos Aguilar Melchor
,
Slim Bettaieb
,
Philippe Gaborit
,
Julien Schrek
.
ima 2013
:
99-119
[doi]
Indifferentiability of Double Length Compression Functions
Bart Mennink
.
ima 2013
:
232-251
[doi]
Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings
Somindu C. Ramanna
,
Palash Sarkar
.
ima 2013
:
344-363
[doi]
Cryptography and Coding - 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings
Martijn Stam
, editor,
Volume 8308 of
Lecture Notes in Computer Science
, Springer,
2013.
[doi]
Estimating Key Sizes for High Dimensional Lattice-Based Systems
Joop van de Pol
,
Nigel P. Smart
.
ima 2013
:
290-303
[doi]
Sign in
or
sign up
to see more results.