| IMACC 2011 Accepted Papers
		
		·     
		
		
		Kenneth Paterson and 
		
		
		Martin Albrecht. 
		Breaking An Identity-Based Encryption Scheme based on DHIES 
		 
		·  
		
		
		
		Stephen C. Williams. 
		Analysis of the SSH Key Exchange Protocol  
		·  
		
		
		Peter Scholl and Nigel Smart. Improved Key Generation For Gentry’s Fully 
		Homomorphic Encryption Scheme  
		·  
		
		
		Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi 
		Mori, Yusuke Sakai and Kazuo Ohta. Ciphertext-Policy Delegatable Hidden 
		Vector Encryption and Its Application to Searchable Encryption in 
		Multi-user Setting  
		·  
		
		
		Yuki Shibuya and Junji Shikata. Constructing Secure Hybrid Encryption 
		from Key Encapsulation Mechanism with Authenticity 
		 
		·  
		
		
		Alex Burrage, Ana Salagean and Raphael Phan. On the Stability of 
		m-Sequences  
		·  
		
		
		Go Yamamoto and Tetsutaro Kobayashi. Self-Correctors for Cryptographic 
		Modules  
		·  
		
		
		
		Colin Boyd 
		and Juan Gonzalez Nieto. Strong Forward Secrecy for One-Round Key 
		Exchange  
		·  
		
		
		Jean-Pierre Flori, Sihem Mesnager and Gerard Cohen. The Value $4$ of 
		Binary Kloosterman Sums  
		·  
		
		
		Delphine Boucher and Felix Ulmer. A Note on the Dual Codes of Module 
		Skew Codes  
		·  
		
		
		Diego Aranha, Edward Knapp, Alfred Menezes and Francisco Rodriguez-Henriquez. 
		Parallelizing the Weil and Tate Pairings  
		·  
		
		
		Malika Izabachene, Benoit Libert and Damien Vergnaud. Block-wise 
		P-Signatures and Non-Interactive Anonymous Credentials with Efficient 
		Attributes  
		·  
		
		
		Frederik Armknecht, Daniel Augot, 
		
		
		Ludovic Perret 
		and Ahmad-Reza Sadeghi. On Constructing Homomorphic Encryption Schemes 
		from Coding Theory  
		·  
		
		
		Kazuhiko Minematsu and 
		
		
		Tetsu Iwata. 
		Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 
		Proposal  
		·  
		
		
		Michael Scott. On the Efficient Implementation of Pairing-Based 
		Protocols  
		·  
		
		
		Martijn Stam and 
		
		
		Elena Andreeva. 
		The Symbiosis between Collision and Preimage Resistance 
		 
		·  
		
		
		Mohamed Ahmed Abdelraheem, Julia Borghoff and 
		
		
		Erik Zenner. 
		Cryptanalysis of the Light-Weight Cipher A2U2  
		·  
		
		
		Junji Shikata and Daisuke Yamanaka. Bit Commitment in the Bounded 
		Storage Model: Tight Bound and Simple Optimal Construction 
		 
		·  
		
		
		
		Daniel Augot,
		
		
		
		Morgan Barbier 
		and 
		
		
		Caroline Fontaine. 
		Ensuring Message Embedding in Wet Paper Steganography 
		 
		·  
		
		
		Vincent Herbert and Sumanta Sarkar. On the Triple-Error-Correcting 
		Cyclic Codes with Zero Set {1, 2^i+1, 2^j+1}  
		·  
		
		
		
		Guilin Wang, 
		Fubiao Xia and Yunlei Zhao. Designated Confirmer Signatures With Unified 
		Verification  
		·  
		
		
		
		Matthew Parker 
		and 
		
		
		Constanza Riera. 
		Generalised Complementary Arrays  
		·  
		
		
		Yasushi Osaki and Tetsu Iwata. Security of Hash-then-CBC Key Wrapping 
		Revisited  
		·  
		
		
		Xusheng Zhang and Dongdai Lin. 
		
		
		Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding 
		Degree 1 and 2 
		·  
		
		
		Kun Peng. 
		
		
		A Secure and Efficient Proof Of Integer in an Interval Range 
		·  
		
		
		Duc-Phong Le and Chik-How Tan. 
		
		
		Improved Precomputation Schemes for (Multi-)Scalar Multiplication on 
		Elliptic Curves 
		·  
		
		
		Marc Mouffron and Guillaume Vergne. 
		
		
		Enhanced Count of Balanced Symmetric Functions and Balanced Alternating 
		Functions 
 |