Cryptography and Coding: 12th IMA International Conference, IMACC 2009, Cirencester, UK, December 15-17, 2009, Proceedings
Matthew G. Parker
Springer Science & Business Media, Dec 7, 2009 - Computers - 495 pages
The12thintheseriesofIMAConferencesonCryptographyandCodingwasheld at the Royal Agricultural College, Cirencester, December 15–17, 2009. The p- gram comprised 3 invited talks and 26 contributed talks. The contributed talks werechosenbyathoroughreviewingprocessfrom53submissions.Oftheinvited and contributed talks,28 arerepresentedaspapersin this volume. These papers are grouped loosely under the headings: Coding Theory, Symmetric Crypt- raphy, Security Protocols, Asymmetric Cryptography, Boolean Functions, and Side Channels and Implementations. Numerous people helped to make this conference a success. To begin with I would like to thank all members of the Technical Program Committee who put a great deal of e?ort into the reviewing process so as to ensure a hi- quality program. Moreover, I wish to thank a number of people, external to the committee, who also contributed reviews on the submitted papers. Thanks, of course,mustalso goto allauthorswho submitted papers to the conference,both those rejected and accepted. The review process was also greatly facilitated by the use of the Web-submission-and-review software, written by Shai Halevi of IBM Research, and I would like to thank him for making this package available to the community. The invited talks were given by Frank Kschischang, Ronald Cramer, and Alexander Pott, and two of these invitedtalksappearaspapersinthisvolume. A particular thanks goes to these invited speakers, each of whom is well-known, notonlyforbeingaworld-leaderintheir?eld,butalsofortheirparticularability to communicate their expertise in an enjoyable and stimulating manner.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
adversary algebraic algorithm APN functions assume attack attribute bent functions binary bits Bivium block cipher blockcipher Boolean functions C-AA cache ciphertext codeword collision resistance compression function compute construction corresponding CRYPTO Cryptography curve decoding deﬁned Deﬁnition degree denote diﬀerent dual eﬃcient element encryption equivalent Euclidean ﬁnd ﬁnding ﬁrst GeometricXL algorithm given Goppa codes hash functions Heidelberg Heidelberg 2009 Hence hyper-bent ideal IEEE input integer Lemma LFSR linear codes Linear Cryptanalysis LNCS matrix module multiplication obtain optimal output pair parameters preimage private key probability problem proof Proposition protocol pseudo-weight public key quadratic query random oracle rank-2 product polynomial Rayleigh quotient recoding sequence result revocation ring signature satisﬁes secret key secret sharing Section self-dual codes signature scheme solution Springer stream cipher subset subspace Table Theorem variables vector veriﬁer