Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cryptography and coding. 7th IMA international conference, Cirencester, GB, December 20--22, 1999. Proceedings - MaRDI portal

Cryptography and coding. 7th IMA international conference, Cirencester, GB, December 20--22, 1999. Proceedings (Q1965370)

From MaRDI portal





scientific article; zbMATH DE number 1400428
Language Label Description Also known as
English
Cryptography and coding. 7th IMA international conference, Cirencester, GB, December 20--22, 1999. Proceedings
scientific article; zbMATH DE number 1400428

    Statements

    Cryptography and coding. 7th IMA international conference, Cirencester, GB, December 20--22, 1999. Proceedings (English)
    0 references
    7 February 2000
    0 references
    The articles of mathematical interest will be reviewed individually. The preceding conference (6th, 1997) has been indicated (see Zbl 0879.00078). Indexed articles: \textit{Paterson, Kenneth G.}, Applications of exponential sums in communications theory, 1-24 [Zbl 0981.94030] \textit{Nikova, Svetla; Nikov, Ventsislav}, Some applications of bounds for designs to the cryptography, 25-34 [Zbl 1014.94557] \textit{Pasalic, Enes; Johansson, Thomas}, Further results on the relation between nonlinearity and resiliency for Boolean functions, 35-44 [Zbl 0981.94071] \textit{Martínez-Moro, Edgar; Galán-Simón, F. Javier; Borges-Trenard, Miguel A.; Borges-Quintana, Mijail}, Combinatorial structure of finite fields with two dimensional modulo metrics., 45-55 [Zbl 1044.94555] \textit{Donelan, Helen; O'Farrell, Timothy}, A new method for generating sets of orthogonal sequences for a synchronous CDMA system, 56-62 [Zbl 0981.94001] \textit{Georgiou, Stelios; Koukouvinos, Christos}, New self-dual codes over GF(5), 63-69 [Zbl 0982.94024] \textit{Filiol, Eric}, Designs, intersecting families, and weight of Boolean functions, 70-80 [Zbl 0943.06006] \textit{Liu, Xian; Farrell, Patrick; Boyd, Colin}, A unified code, 84-93 [Zbl 0981.94063] \textit{Davida, George I.; Frankel, Yair}, Perfectly secure authorization and passive identification for an error tolerant biometric system, 104-113 [Zbl 0981.94045] \textit{Tillich, Jean-Pierre; Zémor, Gilles}, An overview of the isoperimetric method in coding theory. (Extended abstract), 129-134 [Zbl 0982.94027] \textit{Maucher, Johannes; Sidorenko, Vladimir; Bossert, Martin}, Rectangular basis of a linear code, 135-143 [Zbl 0981.94051] \textit{Farrell, Patrick G.; Razavi, Seyed H.}, Graph decoding of array error-correcting codes, 144-152 [Zbl 0981.94057] \textit{O'Donoghue, Conor; Burkley, Cyril}, Catastrophicity test for time-varying convolutional encoders, 153-162 [Zbl 0981.94053] \textit{Oh, Min-seok; Sweeney, Peter}, Low complexity soft-decision sequential decoding using hybrid permutation for Reed-Solomon codes, 163-172 [Zbl 0981.94061] \textit{Norton, Graham H.; Sălăgean, Ana}, On efficient decoding of alternant codes over a commutative ring, 173-178 [Zbl 0981.94060] \textit{Gwak, Jihye; Shin, Sooyoung Kim; Kim, Hyung-Myung}, Reduced complexity sliding window BCJR decoding algorithms for turbo codes, 179-184 [Zbl 0981.94058] \textit{Kukorelly, Zsolt}, The piling-up lemma and dependent random variables, 186-190 [Zbl 0981.94029] \textit{Galbraith, Steven D.; Smart, Nigel P.}, A cryptographic application of Weil descent, 191-200 [Zbl 0981.94025] \textit{Menicocci, Renato; Golić, Jovan Dj.}, Edit probability correlation attack on the bilateral stop/go generator, 201-212 [Zbl 1014.94551] \textit{Hasan, M. A.}, Look-up table based large finite field multiplication in memory constrained cryptosystems. (Extended abstract), 213-221 [Zbl 0981.94028] \textit{Müller, Siguna}, On the combined Fermat/Lucas probable prime test, 222-235 [Zbl 1017.11068] \textit{Golomb, Solomon W.}, On the cryptanalysis of nonlinear sequences, 236-242 [Zbl 0981.94026] \textit{Fischlin, Roger; Seifert, Jean-Pierre}, Tensor-based trapdoors for CVP and their application to public key cryptography. (Extended abstract), 244-257 [Zbl 0981.94024] \textit{Mu, Yi; Varadharajan, Vijay; Nguyen, Khan Quac}, Delegated decryption, 258-269 [Zbl 0981.94044] \textit{Ryabko, Boris; Fionov, Andrei}, Fast and space-efficient adaptive arithmetic coding, 270-279 [Zbl 0981.94005] \textit{Barmawi, Ari Moesriami; Takada, Shingo; Doi, Norihisa}, Robust protocol for generating shared RSA parameters, 280-289 [Zbl 0981.94021] \textit{Wesemeyer, Stephan; Sweeney, Peter; Burgess, David R. B.}, Some soft-decision decoding algorithms for Reed-Solomon codes, 290-299 [Zbl 0981.94062] \textit{Blackburn, Simon R.; Blake-Wilson, Simon; Burmester, Mike; Galbraith, Steven D.}, Weaknesses in shared RSA key generation protocols, 300-306 [Zbl 0981.94022] \textit{Yeun, Chan Yeob}, Digital signature with message recovery and authenticated encryption (signcryption). -- A comparison, 307-312 [Zbl 0981.94047]
    0 references
    Cirencester (GB)
    0 references
    Proceedings
    0 references
    Conference
    0 references
    IMA conference
    0 references
    Cryptography
    0 references
    Coding
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references