IMACC2017 SLIDES


In co-operation with IACR

16th IMA International Conference on Cryptography and Coding

12 – 14 December 2017, St Catherine’s College, University of Oxford

Invited Talks

Fully Homomorphic Encryption, recent constructions and open problems
Daniele Micciancio
University of California, San Diego
Slides_DMicciancio

A Decade of Direct Anonymous Attestation - From Research to Standard to Research
Jan Camenisch
IBM Research, Zurich
Slides_JCamenisch

Quantum Safe Cryptography from Codes: Present and Future
Nicolas Sendrier
INRIA, France
Slides_NSendrier

A journey in the land of (hash-and-sign) lattice-based signatures
Thomas Prest
Thales Communications & Security, France
Slides_TPrest

Special Session

If and how implementation attacks shape the design of lattice-based signature scheme
Nina Bindel
TU Darmstadt
Slides_NBindel

Efficient Implementation of Lattice-based Cryptography for Embedded Devices
Tim Güneysu, Tobias Oder
Ruhr Universitat Bochum
Slides_TOder

Exploring Fault Attacks Resistance and Possible Countermeasures for Lattice Based Cryptography
Francesco Regazzoni
USI, Switzerland
Slides_FRegazzoni

Practical Post-quantum (H)IBE
Peter Campbell, Michael Groves
NCSC
Slides_PCampbell

 

Accepted Papers

On the probability of incorrect decoding for linear codes
Marco Frego
University of Trento
Slides_MFrego

When It's All Just Too Much: Outsourcing MPC-Preprocessing
Peter Scholl, Nigel Smart and Timothy Wood
University of Bristol
Slides_TWood

Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption
Ryo Hiromasa and Yutaka Kawai. 
Mitsubishi Electric

Bilinear cryptography using groups of nilpotency class 2
Ayan Mahalanobis and Pralhad Shinde. 
IISER, Pune

Revealing Encryption for Partial Ordering
Helene Haagh, Claudio Orlandi, Chenxing Li, Yue Ji and Yifan Song. 
Aarhus University/IIIS, Tsinghua University

Lattice Attacks on Pairing-Based Signatures
Thierry Mefenza and Damien Vergnaud.
ENS Paris/ ENS Ulm
Slides_TMefenza

Orthogonal MDS Diffusion Matrices over Galois Rings
Chik How Tan and Theo Fanuela Prabowo. 
Temasek Laboratories, National University of Singapore
Slides_CHTan

Lattice Reductions over Euclidean Rings with Applications to Cryptanalysis
Taechan Kim and Changmin Lee. 
NTT Secure Platform Laboratories/Seoul National University
Slides_TKim

Practical Homomorphic Encryption Over the Integers for Secure Computation in the Cloud
James Dyer, Martin Dyer and Jie Xu. 
University of Manchester/University of Leeds
Slides_JDyer

MILP-based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher
Raghvendra Rohit, Riham Altawy and Guang Gong.
University of Waterloo
Slides_GGong

CAKE: Code-based Algorithm for Key Encapsulation
Paulo S. L. M. Barreto, Shay Gueron, Tim Guneysu, Rafael Misoczki, Edoardo Persichetti, Nicolas Sendrier and Jean-Pierre Tillich. 
University of Washington Tacoma/University of Haifa and Amazon Web Services/University of Bremen and DFKI/Intel Corporation/Florida Atlantic University/INRIA
Slides_EPersichetti

Notes On GGH13 Without The Presence Of Ideals
Martin Albrecht, Alex Davidson and Enrique Larraia. 
Royal Holloway, University of London
Slides_ADavidson

A Linearly Homomorphic Signature Scheme From Weaker Assumptions
Lucas Schabhüser, Johannes Buchmann and Patrick Struck. 
TU Darmstadt
Slides_LSchabhuser

A Practical Implementation of Identity-Based Encryption over NTRU Lattices
Sarah McCarthy, Neil Smyth and Elizabeth O'Sullivan. 
Queen's University Belfast
Slides_SMcCarthy

Subset Signatures with Controlled Context-Hiding
Essam Ghadafi.
University of the West of England, Bristol
Slides_EGhadafi2

Attribute-Based Signatures with User-Controlled Linkability without Random Oracles
Ali El Kaafarani and Essam Ghadafi. 
University of Oxford/University of the West of England, Bristol
Slides_AElKaafarani

How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors
Essam Ghadafi. 
University of the West of England, Bristol
Slides_EGhadafi1

Improvement on minimum distance of symbol-pair codes
Han Zhang. 
Northwest University, China
Slides_HZhang

A note on the implementation of the Number Theoretic Transform
Michael Scott.
MIRACL
Slides_MScott

 

Copyright Form

**Please note that camera-ready papers should be a maximum of 25 pages in length (Excluding title and abstract, the body of the paper should be at most 14 pages) **

Copyright Form can be downloaded below:

Consent to Publish form

This conference is supported by SAFEcrypto

http://www.safecrypto.eu/