Search dblp for Publications

export results for "toc:db/conf/ima/ima2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ima/AlawatugodaSB15,
  author       = {Janaka Alawatugoda and
                  Douglas Stebila and
                  Colin Boyd},
  editor       = {Jens Groth},
  title        = {Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {277--294},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_17},
  doi          = {10.1007/978-3-319-27239-9\_17},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/AlawatugodaSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/AtenieseFK15,
  author       = {Giuseppe Ateniese and
                  Antonio Faonio and
                  Seny Kamara},
  editor       = {Jens Groth},
  title        = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs
                  of Storage},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {311--328},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_19},
  doi          = {10.1007/978-3-319-27239-9\_19},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/AtenieseFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Badertscher0MRT15,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer and
                  Phillip Rogaway and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Jens Groth},
  title        = {Robust Authenticated Encryption and the Limits of Symmetric Cryptography},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_7},
  doi          = {10.1007/978-3-319-27239-9\_7},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Badertscher0MRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BarwellPS15,
  author       = {Guy Barwell and
                  Daniel Page and
                  Martijn Stam},
  editor       = {Jens Groth},
  title        = {Rogue Decryption Failures: Reconciling {AE} Robustness Notions},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {94--111},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_6},
  doi          = {10.1007/978-3-319-27239-9\_6},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BarwellPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CrepeauK15,
  author       = {Claude Cr{\'{e}}peau and
                  Raza Ali Kazmi},
  editor       = {Jens Groth},
  title        = {Zero-Knowledge Interactive Proof Systems for New Lattice Problems},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {152--169},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_9},
  doi          = {10.1007/978-3-319-27239-9\_9},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/CrepeauK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/DerlerHS15,
  author       = {David Derler and
                  Christian Hanser and
                  Daniel Slamanig},
  editor       = {Jens Groth},
  title        = {A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {57--74},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_4},
  doi          = {10.1007/978-3-319-27239-9\_4},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/DerlerHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GotoS15,
  author       = {Shota Goto and
                  Junji Shikata},
  editor       = {Jens Groth},
  title        = {A Compiler of Two-Party Protocols for Composable and Game-Theoretic
                  Security, and Its Application to Oblivious Transfer},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {133--151},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_8},
  doi          = {10.1007/978-3-319-27239-9\_8},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/GotoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KabatianskyVT15,
  author       = {Grigory Kabatiansky and
                  Serge G. Vladut and
                  C{\'{e}}dric Tavernier},
  editor       = {Jens Groth},
  title        = {On the Doubly Sparse Compressed Sensing Problem},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {184--189},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_11},
  doi          = {10.1007/978-3-319-27239-9\_11},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KabatianskyVT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Klove15,
  author       = {Torleiv Kl{\o}ve},
  editor       = {Jens Groth},
  title        = {Codes of Length 2 Correcting Single Errors of Limited Size},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {190--201},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_12},
  doi          = {10.1007/978-3-319-27239-9\_12},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Klove15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KocakMO15,
  author       = {Nese Ko{\c{c}}ak and
                  Sihem Mesnager and
                  Ferruh {\"{O}}zbudak},
  editor       = {Jens Groth},
  title        = {Bent and Semi-bent Functions via Linear Translators},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {205--224},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_13},
  doi          = {10.1007/978-3-319-27239-9\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/KocakMO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/LiberatoriAMF15,
  author       = {M{\'{o}}nica C. Liberatori and
                  Leonardo J. Arnone and
                  Jorge Casti{\~{n}}eira Moreira and
                  Patrick Guy Farrell},
  editor       = {Jens Groth},
  title        = {Soft Distance Metric Decoding of Polar Codes},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {173--183},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_10},
  doi          = {10.1007/978-3-319-27239-9\_10},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/LiberatoriAMF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/LiuMC15,
  author       = {Jian Liu and
                  Sihem Mesnager and
                  Lusheng Chen},
  editor       = {Jens Groth},
  title        = {On the Diffusion Property of Iterated Functions},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_15},
  doi          = {10.1007/978-3-319-27239-9\_15},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/LiuMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MartinOSW15,
  author       = {Daniel P. Martin and
                  Elisabeth Oswald and
                  Martijn Stam and
                  Marcin W{\'{o}}jcik},
  editor       = {Jens Groth},
  title        = {A Leakage Resilient {MAC}},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {295--310},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_18},
  doi          = {10.1007/978-3-319-27239-9\_18},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/MartinOSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MesnagerCM15,
  author       = {Sihem Mesnager and
                  G{\'{e}}rard D. Cohen and
                  David Madore},
  editor       = {Jens Groth},
  title        = {On Existence (Based on an Arithmetical Problem) and Constructions
                  of Bent Functions},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_1},
  doi          = {10.1007/978-3-319-27239-9\_1},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/MesnagerCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MinematsuI15,
  author       = {Kazuhiko Minematsu and
                  Tetsu Iwata},
  editor       = {Jens Groth},
  title        = {Tweak-Length Extension for Tweakable Blockciphers},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {77--93},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_5},
  doi          = {10.1007/978-3-319-27239-9\_5},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/MinematsuI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/PatersonSSW15,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Dale L. Sibborn and
                  Hoeteck Wee},
  editor       = {Jens Groth},
  title        = {Security Against Related Randomness Attacks via Reconstructive Extractors},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_2},
  doi          = {10.1007/978-3-319-27239-9\_2},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/PatersonSSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Skorski15,
  author       = {Maciej Sk{\'{o}}rski},
  editor       = {Jens Groth},
  title        = {Shannon Entropy Versus Renyi Entropy from a Cryptographic Viewpoint},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {257--274},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_16},
  doi          = {10.1007/978-3-319-27239-9\_16},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Skorski15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/WinterSP15,
  author       = {Richard Winter and
                  Ana Salagean and
                  Raphael C.{-}W. Phan},
  editor       = {Jens Groth},
  title        = {Comparison of Cube Attacks Over Different Vector Spaces},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {225--238},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_14},
  doi          = {10.1007/978-3-319-27239-9\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/WinterSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/ZhangT15,
  author       = {Wenbin Zhang and
                  Chik How Tan},
  editor       = {Jens Groth},
  title        = {MI-T-HFE, {A} New Multivariate Signature Scheme},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {43--56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_3},
  doi          = {10.1007/978-3-319-27239-9\_3},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/ZhangT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/2015,
  editor       = {Jens Groth},
  title        = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9},
  doi          = {10.1007/978-3-319-27239-9},
  isbn         = {978-3-319-27238-2},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics