LEADER 04204nam 22006735 450 001 996466193403316 005 20200630045533.0 010 $a3-030-35199-8 024 7 $a10.1007/978-3-030-35199-1 035 $a(CKB)4100000010013754 035 $a(MiAaPQ)EBC6303026 035 $a(DE-He213)978-3-030-35199-1 035 $a(PPN)242818420 035 $a(EXLCZ)994100000010013754 100 $a20191116d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptography and Coding$b[electronic resource] $e17th IMA International Conference, IMACC 2019, Oxford, UK, December 16?18, 2019, Proceedings /$fedited by Martin Albrecht 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (viii, 367 pages) $cillustrations 225 1 $aSecurity and Cryptology ;$v11929 300 $aIncludes index. 311 $a3-030-35198-X 327 $aA Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing -- Decryption Algorithm Substitution Attacks -- Subversion-Resistant Simulation (Knowledge) Sound NIZKs -- Classi?cation of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2 -- A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange -- E?cient Fully Secure Leakage-Deterring Encryption -- Sharing the LUOV: Threshold Post-Quantum Signatures -- Commodity-Based 2PC for Arithmetic Circuits -- Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions -- Forgery Attacks on FlexAE and FlexAEAD -- Key Recovery Attacks on Some Rank Metric Code-based Signatures -- On the Security of Multikey Homomorphic Encryption -- RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations -- Cryptanalysis of a Protocol for E?cient Sorting on SHE Encrypted Data -- Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes -- SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model -- Distributing any Elliptic Curve Based Protocol. 330 $aThis book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory. 410 0$aSecurity and Cryptology ;$v11929 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer organization 606 $aApplication software 606 $aSoftware engineering 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputer organization. 615 0$aApplication software. 615 0$aSoftware engineering. 615 14$aCryptology. 615 24$aSecurity. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aSoftware Engineering/Programming and Operating Systems. 676 $a005.82 702 $aAlbrecht$b Martin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466193403316 996 $aCryptography and Coding$9772174 997 $aUNISA