Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17--19, 2001. Proceedings (Q5952310)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17--19, 2001. Proceedings |
scientific article; zbMATH DE number 1688715
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17--19, 2001. Proceedings |
scientific article; zbMATH DE number 1688715 |
Statements
Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17--19, 2001. Proceedings (English)
0 references
9 January 2002
0 references
The articles of this volume will be reviewed individually. Indexed articles: \textit{Al Jabri, A.}, A statistical decoding algorithm for general linear block codes, 1-8 [Zbl 0999.94531] \textit{Lange, Christoph; Ahrens, Andreas}, On the undetected error probability for shortened Hamming codes on channels with memory, 9-19 [Zbl 0999.94572] \textit{Siap, Irfan}, The complete weight enumerator for codes over \({\mathcal M}_{n\times s}(\mathbb F_g)\), 20-26 [Zbl 0999.94561] \textit{Yoshida, Maki; Fujiwara, Toru}, Further improvement of Kumar-Rajagopalan-Sahai coding constructions for blacklisting problem, 27-37 [Zbl 0999.94562] \textit{Hirst, Simon; Honary, Bahram}, A simple soft-input/soft-output decoder for Hamming codes, 38-43 [Zbl 0999.94566] \textit{von Willich, Manfred}, A technique with an information-theoretic basis for protecting secret data from differential power attacks, 44-62 [Zbl 0999.94537] \textit{Brincat, Karl; Mitchell, Chris J.}, Key recovery attacks on MACs based on properties of cryptographic APIs, 63-72 [Zbl 0999.94553] \textit{Smart, N. P.}, The exact security of ECIES in the generic group model, 73-84 [Zbl 1002.68806] \textit{Filiol, Eric; Fontaine, Caroline}, A new ultrafast stream cipher design: COS ciphers, 85-98 [Zbl 1001.68907] \textit{Joye, Marc; Quisquater, Jean-Jacques}, On Rabin-type signatures, 99-113 [Zbl 0998.94550] \textit{Kim, Seungjoo; Cheon, Jung Hee; Joye, Marc; Lim, Seongan; Mambo, Masahiro; Won, Dongho; Zheng, Yuliang}, Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation), 114-127 [Zbl 1024.68527] \textit{Galán-Simón, F. Javier; Martinez-Moro, Edgar; Tena-Ayuso, Juan G.}, Majority-logic-decodable cyclic arithmetic-modular AN codes in 1, 2, and \(\text{L}\) steps, 128-137 [Zbl 0998.94557] \textit{MacKay, David J. C.}, Almost-certainly runlength-limiting codes, 138-147 [Zbl 0998.94525] \textit{van Mourik, Jort; Saad, David; Kabashima, Yoshiyuki}, Weight vs. magnetization enumerator for Gallager codes, 148-157 [Zbl 0998.94560] \textit{Paire, J. T.; Coulton, P.; Farrell, P. G.}, Graph configurations and decoding performance, 158-165 [Zbl 0998.94559] \textit{Benachour, P.; Farrell, P. G.; Honary, Bahram}, A line code construction for the adder channel with rates higher than time-sharing, 166-175 [Zbl 0998.94522] \textit{Al-Dabbagh, Ahmed; Darnell, Michael}, The synthesis of TD-sequences and their application to multi-functional communication systems, 176-190 [Zbl 0998.94505] \textit{Nikova, Svetla; Nikov, Ventzislav}, Improvement of the Delsarte bound for \(\tau\)-designs in finite polynomial metric spaces, 191-204 [Zbl 1005.94542] \textit{Li, Shujun; Li, Qi; Li, Wenmin; Mou, Xuanqin; Cai, Yuanlong}, Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding, 205-221 [Zbl 0998.94543] \textit{Daemen, Joan; Rijmen, Vincent}, The wide trail design strategy, 222-238 [Zbl 0998.94541] \textit{Borselius, Niklas; Mitchell, Chris J.; Wilson, Aaron}, Undetachable threshold signatures, 239-244 [Zbl 0998.94548] \textit{Schindler, Werner; Koeune, François; Quisquater, Jean-Jacques}, Improving divide and conquer attacks against cryptosystems by better error detection: correction strategies, 245-267 [Zbl 0998.94545] \textit{Rantos, Konstantinos; Mitchell, Chris J.}, Key recovery scheme interoperability -- a protocol for mechanism negotiation, 268-276 [Zbl 1002.68808] \textit{Prissette, Cyril}, Unconditionally secure key agreement protocol, 277-293 [Zbl 0998.94544] \textit{Komninos, N.; Honary, Bahram; Darnell, Michael}, An efficient stream cipher Alpha1 for mobile and wireless devices, 294-306 [Zbl 1002.68807] \textit{Masol, Viktoriya}, Investigation of linear codes possessing some extra properties, 301-306 [Zbl 0998.94564] \textit{Saad, David; Kabashima, Yoshiyuki; Murayama, Tatsuto; Vicente, Renato}, Statistical physics of low density parity check error correcting codes, 307-316 [Zbl 0998.94562] \textit{Giuliani, Kenneth J.; Gong, Guang}, Generating large instances of the Gong-Harn cryptosystem, 317-328 [Zbl 0998.94542] \textit{Crouch, P. A.; Davenport, J. H.}, Lattice attacks on RSA-encrypted IP and TCP, 329-338 [Zbl 1002.68809] \textit{Parker, Matthew G.}, Spectral bounded sequences, codes, and states: graph constructions and entanglement, 339-354 [Zbl 0999.94560] \textit{Geiselmann, Willi; Steinwandt, Rainer; Beth, Thomas}, Attacking the affine parts of SFLASH, 355-359 [Zbl 0999.94555] \textit{Cocks, Clifford}, An identity based encryption scheme based on quadratic residues, 360-363 [Zbl 0999.94532] \textit{Batina, Lejla; Muurling, Geeke}, Another way of doing RSA cryptography in hardware, 364-373 [Zbl 1002.68630] \textit{Hernández, Julio César; Sierra, José María; Ribagorda, Arturo; Ramos, Benjamin; Mex-Perera, J. C.}, Distinguishing TEA from a random permutation: reduced round versions of TEA do not have the SAC or do not generate random numbers, 374-377 [Zbl 1002.68810] \textit{Tabatabaian, Seyed J.; Ikeshiro, Sam; Gumussoy, Murat; Dhanda, Mungal S.}, A new search pattern in multiple residue method (MRM) and its importance in the cryptanalysis of the RSA, 378-386 [Zbl 0999.94536] \textit{Lee, Jongkook; Ryu, Shiryong; Kim, Jeungseop; Yoo, Keeyoung}, A new undeniable signature scheme using smart cards, 387-394 [Zbl 0999.94556] \textit{Lev, Alexandr Y.; Lev, Yuliy A.; Okhrymenko, Vyacheslav N.}, Non-binary block inseparable errors control codes, 395-401 [Zbl 0999.94571] \textit{Leveiller, Sabine; Boutros, Joseph; Guillot, Philippe; Zémor, Gilles}, Cryptanalysis of nonlinear filter generators with \(\{0,1\}\)-metric Viterbi decoding, 402-414 [Zbl 1004.94539]
0 references
Cirencester (GB)
0 references
Proceedings
0 references
Conference
0 references
Cryptography
0 references
Coding
0 references
IMA conference
0 references