04204nam 22006735 450 99646619340331620200630045533.03-030-35199-810.1007/978-3-030-35199-1(CKB)4100000010013754(MiAaPQ)EBC6303026(DE-He213)978-3-030-35199-1(PPN)242818420(EXLCZ)99410000001001375420191116d2019 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierCryptography and Coding[electronic resource] 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings /edited by Martin Albrecht1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (viii, 367 pages) illustrationsSecurity and Cryptology ;11929Includes index.3-030-35198-X A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing -- Decryption Algorithm Substitution Attacks -- Subversion-Resistant Simulation (Knowledge) Sound NIZKs -- Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2 -- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange -- Efficient Fully Secure Leakage-Deterring Encryption -- Sharing the LUOV: Threshold Post-Quantum Signatures -- Commodity-Based 2PC for Arithmetic Circuits -- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions -- Forgery Attacks on FlexAE and FlexAEAD -- Key Recovery Attacks on Some Rank Metric Code-based Signatures -- On the Security of Multikey Homomorphic Encryption -- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations -- Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data -- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes -- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model -- Distributing any Elliptic Curve Based Protocol.This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.Security and Cryptology ;11929Data encryption (Computer science)Data protectionComputer organizationApplication softwareSoftware engineeringCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28000Computer Systems Organization and Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13006Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Software Engineering/Programming and Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14002Data encryption (Computer science).Data protection.Computer organization.Application software.Software engineering.Cryptology.Security.Computer Systems Organization and Communication Networks.Information Systems Applications (incl. Internet).Software Engineering/Programming and Operating Systems.005.82Albrecht Martinedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466193403316Cryptography and Coding772174UNISA