Thirteenth IMA International Conference on


12th to 15th of December 2011        Lady Margaret Hall       University of Oxford      the UK









Call for papers











Accepted papers





Invited speakers












Content starts here

Content starts here


IMACC 2011 Accepted Papers

·      Kenneth Paterson and Martin Albrecht. Breaking An Identity-Based Encryption Scheme based on DHIES

·   Stephen C. Williams. Analysis of the SSH Key Exchange Protocol

·   Peter Scholl and Nigel Smart. Improved Key Generation For Gentry’s Fully Homomorphic Encryption Scheme

·   Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai and Kazuo Ohta. Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting

·   Yuki Shibuya and Junji Shikata. Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity

·   Alex Burrage, Ana Salagean and Raphael Phan. On the Stability of m-Sequences

·   Go Yamamoto and Tetsutaro Kobayashi. Self-Correctors for Cryptographic Modules

·   Colin Boyd and Juan Gonzalez Nieto. Strong Forward Secrecy for One-Round Key Exchange

·   Jean-Pierre Flori, Sihem Mesnager and Gerard Cohen. The Value $4$ of Binary Kloosterman Sums

·   Delphine Boucher and Felix Ulmer. A Note on the Dual Codes of Module Skew Codes

·   Diego Aranha, Edward Knapp, Alfred Menezes and Francisco Rodriguez-Henriquez. Parallelizing the Weil and Tate Pairings

·   Malika Izabachene, Benoit Libert and Damien Vergnaud. Block-wise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes

·   Frederik Armknecht, Daniel Augot, Ludovic Perret and Ahmad-Reza Sadeghi. On Constructing Homomorphic Encryption Schemes from Coding Theory

·   Kazuhiko Minematsu and Tetsu Iwata. Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal

·   Michael Scott. On the Efficient Implementation of Pairing-Based Protocols

·   Martijn Stam and Elena Andreeva. The Symbiosis between Collision and Preimage Resistance

·   Mohamed Ahmed Abdelraheem, Julia Borghoff and Erik Zenner. Cryptanalysis of the Light-Weight Cipher A2U2

·   Junji Shikata and Daisuke Yamanaka. Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction

·   Daniel Augot, Morgan Barbier and Caroline Fontaine. Ensuring Message Embedding in Wet Paper Steganography

·   Vincent Herbert and Sumanta Sarkar. On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2^i+1, 2^j+1}

·   Guilin Wang, Fubiao Xia and Yunlei Zhao. Designated Confirmer Signatures With Unified Verification

·   Matthew Parker and Constanza Riera. Generalised Complementary Arrays

·   Yasushi Osaki and Tetsu Iwata. Security of Hash-then-CBC Key Wrapping Revisited

·   Xusheng Zhang and Dongdai Lin. Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2

·   Kun Peng. A Secure and Efficient Proof Of Integer in an Interval Range

·   Duc-Phong Le and Chik-How Tan. Improved Precomputation Schemes for (Multi-)Scalar Multiplication on Elliptic Curves

·   Marc Mouffron and Guillaume Vergne. Enhanced Count of Balanced Symmetric Functions and Balanced Alternating Functions
















Last updated: 29-August-2011