Cryptography and Coding

8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings

Editors:

ISBN: 978-3-540-43026-1 (Print) 978-3-540-45325-3 (Online)

Table of contents (38 chapters)

previous Page of 2
  1. No Access

    Book Chapter

    Pages 1-8

    A Statistical Decoding Algorithm for General Linear Block Codes

  2. No Access

    Book Chapter

    Pages 9-19

    On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory

  3. No Access

    Book Chapter

    Pages 20-26

    The Complete Weight Enumerator for Codes over M nxs(F q)

  4. No Access

    Book Chapter

    Pages 27-37

    Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem

  5. No Access

    Book Chapter

    Pages 38-43

    A Simple Soft-Input/Soft-Output Decoder for Hamming Codes

  6. No Access

    Book Chapter

    Pages 44-62

    A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks

  7. No Access

    Book Chapter

    Pages 63-72

    Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs

  8. No Access

    Book Chapter

    Pages 73-84

    The Exact Security of ECIES in the Generic Group Model

  9. No Access

    Book Chapter

    Pages 85-98

    A New Ultrafast Stream Cipher Design: COS Ciphers

  10. No Access

    Book Chapter

    Pages 99-113

    On Rabin-Type Signatures

  11. No Access

    Book Chapter

    Pages 114-127

    Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)

  12. No Access

    Book Chapter

    Pages 128-137

    Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps

  13. No Access

    Book Chapter

    Pages 138-147

    Almost-Certainly Runlength-Limiting Codes

  14. No Access

    Book Chapter

    Pages 148-157

    Weight vs. Magnetization Enumerator for Gallager Codes

  15. No Access

    Book Chapter

    Pages 158-165

    Graph Configurations and Decoding Performance

  16. No Access

    Book Chapter

    Pages 166-175

    A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing

  17. No Access

    Book Chapter

    Pages 176-190

    The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems

  18. No Access

    Book Chapter

    Pages 191-204

    Improvement of the Delsarte Bound for τ-Designs in Finite Polynomial Metric Spaces

  19. No Access

    Book Chapter

    Pages 205-221

    Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding

  20. No Access

    Book Chapter

    Pages 222-238

    The Wide Trail Design Strategy

previous Page of 2