default search action
8th IMA 2001: Cirencester, UK
- Bahram Honary:
Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings. Lecture Notes in Computer Science 2260, Springer 2001, ISBN 3-540-43026-1 - A. Kh. Al Jabri:
A Statistical Decoding Algorithm for General Linear Block Codes. 1-8 - Christoph Lange, Andreas Ahrens:
On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory. 9-19 - Irfan Siap:
The Complete Weight Enumerator for Codes over Mn×s(Fq). 20-26 - Maki Yoshida, Toru Fujiwara:
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem. 27-37 - Simon Hirst, Bahram Honary:
A Simple Soft-Input/Soft-Output Decoder for Hamming Codes. 38-43 - Manfred von Willich:
A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks. 44-62 - Karl Brincat, Chris J. Mitchell:
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. 63-72 - Nigel P. Smart:
The Exact Security of ECIES in the Generic Group Model. 73-84 - Eric Filiol, Caroline Fontaine:
A New Ultrafast Stream Cipher Design: COS Ciphers. 85-98 - Marc Joye, Jean-Jacques Quisquater:
On Rabin-Type Signatures. 99-113 - Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng:
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). 114-127 - F. Javier Galán-Simón, Edgar Martínez-Moro, Juan Tena Ayuso:
Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps. 128-137 - David J. C. MacKay:
Almost-Certainly Runlength-Limiting Codes. 138-147 - Jort van Mourik, David Saad, Yoshiyuki Kabashima:
Weight vs. Magnetization Enumerator for Gallager Codes. 148-157 - J. T. Paire, Paul Coulton, Patrick Guy Farrell:
Graph Configurations and Decoding Performance. 158-165 - Phillip Benachour, Patrick Guy Farrell, Bahram Honary:
A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing. 166-175 - Ahmed Al-Dabbagh, Michael Darnell:
The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems. 176-190 - Svetla Nikova, Ventzislav Nikov:
Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces. 191-204 - Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou, Yuanlong Cai:
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. 205-221 - Joan Daemen, Vincent Rijmen:
The Wide Trail Design Strategy. 222-238 - Niklas Borselius, Chris J. Mitchell, Aaron Wilson:
Undetachable Threshold Signatures. 239-244 - Werner Schindler, François Koeune, Jean-Jacques Quisquater:
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. 245-267 - Konstantinos Rantos, Chris J. Mitchell:
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. 268-276 - Cyril Prissette:
Unconditionally Secure Key Agreement Protocol. 277-293 - N. Komninos, Bahram Honary, Michael Darnell:
An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices. 294-300 - Viktoriya Masol:
Investigation of Linear Codes Possessing Some Extra Properties. 301-306 - David Saad, Yoshiyuki Kabashima, Tatsuto Murayama, Renato Vicente:
Statistical Physics of Low Density Parity Check Error Correcting Codes. 307-316 - Kenneth J. Giuliani, Guang Gong:
Generating Large Instances of the Gong-Harn Cryptosystem. 317-328 - Paul A. Crouch, James H. Davenport:
Lattice Attacks on RSA-Encrypted IP and TCP. 329-338 - Matthew Geoffrey Parker:
Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement. 339-354 - Willi Geiselmann, Rainer Steinwandt, Thomas Beth:
Attacking the Affine Parts of SFLASH. 355-359 - Clifford C. Cocks:
An Identity Based Encryption Scheme Based on Quadratic Residues. 360-363 - Lejla Batina, Geeke Muurling:
Another Way of Doing RSA Cryptography in Hardware. 364-373 - Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera:
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. 374-377 - Seyed J. Tabatabaian, Sam Ikeshiro, Murat Gumussoy, Mungal S. Dhanda:
A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA. 378-386 - Lee Jongkook, Ryu Shiryong, Kim Jeungseop, Yoo Keeyoung:
A New Undeniable Signature Scheme Using Smart Cards. 387-394 - Alexandr Y. Lev, Yuliy A. Lev, Vyacheslav N. Okhrymenko:
Non-binary Block Inseparable Errors Control Codes. 395-401 - Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor:
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. 402-414
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.