14th IMA INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY AND CODING : Accepted Papers

FOURTEENTH IMA INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY AND CODING

Accepted Papers

Security Amplification against Meet-in-the-Middle Attacks Using Whitening
Pierre-Alain Fouque and Pierre Karpman (Université de Rennes 1, France, Institut universitaire de France, France, École normale supérieure de Cachan, antenne de Bretagne, France, and Nanyang Technological University, Singapore)

Estimating Key Sizes For High Dimensional Lattice Based Systems
Joop van de Pol and Nigel P. Smart (University of Bristol, UK)

Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.
James McLaughlin and John A. Clark (University of York, UK)

Indifferentiability of Double Length Compression Functions
Bart Mennink (KU Leuven, Belgium)

Secure Key Management in the Cloud
Ivan Damgård, Thomas P. Jakobsen, Jesper B. Nielsen, and Jakob I. Pagter (Aarhus University, Denmark and The Alexandra Institute Ltd., Denmark)

Efficient Generation of Elementary Sequences
David Gardner, Ana Salagean, and Raphael C.-W. Phan (Loughborough University, UK and Multimedia University, Malaysia)

Anonymous Constant-Size Ciphertext HIBE From Asymmetric Pairings
Somindu C. Ramanna and Palash Sarkar (Applied Statistics Unit, Indian Statistical Institute, Kolkata, India)

High-Order Masking by Using Coding Theory and its Application to AES
Guilhem Castagnos, Soline Renner, and Gilles Zémor (Institut de Mathématiques de Bordeaux, Université Bordeaux 1 and CNRS, France and Oberthur Technologies Security Group)

Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
Joppe W. Bos, Kristin Lauter, Jake Loftus, and Michael Naehrig (Microsoft Research, USA, and University of Bristol, UK)

Sub-linear Blind Ring Signatures without Random Oracles
Essam M. Ghadafi (University of Bristol, UK)

On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption
Joël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro, and David Wilson (ETH Zurich, Switzerland, HASLab - INESC TEC and Universidade do Minho, Portugal, TU Darmstadt, Germany, City University of New York, USA, Applied Communication Sciences, USA, MIT, USA, and UCSB, USA)

Recovering Private Keys Generated With Weak PRNGs
Pierre-Alain Fouque, Mehdi Tibouchi, and Jean-Christophe Zapalowicz ( Université de Rennes 1, France, Institut universitaire de France, France, NTT Secure Platform Laboratories, Japan, and INRIA Rennes, France)

Constructions of Signcryption in the Multi-user Setting from Identity-based Encryption
Rintaro Nakano and Junji Shikata (Yokohama National University, Japan)

On Minimal and Quasi-Minimal Linear Codes
Gérard D. Cohen, Sihem Mesnager, and Alain Patey (Telecom ParisTech, France, University of Paris VIII, France, LAGA, University of Paris XIII, France, and Morpho, France)

Semi-bent functions from oval polynomials
Sihem Mesnager(University of Paris XIII, France and University of Paris VIII, France)

On the Homomorphic Computation of Symmetric Cryptographic Primitives
Silvia Mella and Ruggero Susella (STMicroelectronics, Belgium)

A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme
David Galindo and Srinivas Vivek (CNRS, Loria, France and University of Luxembourg, Luxembourg)

Hashing Mode Using a Lightweight Blockcipher
Hidenori Kuwakado and Shoichi Hirose (Kansai University, Japen, and University of Fukui, Japan)

Differential Cryptanalysis of Keccak Variants
Stefan Kölbl, Florian Mendel, Tomislav Nad, and Martin Schläffer (IAIK, Graz University of Technology, Austria)

A Code-Based Undeniable Signature Scheme
Carlos Aguilar-Melchor, Slim Bettaieb, Philippe Gaborit, and Julien Schrek (University of Limoges, France)