Cryptography and Coding

9th IMA International Conference, Cirencester, UK, December 16-18, 2003. Proceedings

Editors:

ISBN: 978-3-540-20663-7 (Print) 978-3-540-40974-8 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Coding and Applications

    1. No Access

      Book Chapter

      Pages 1-3

      Recent Developments in Array Error-Control Codes

    2. No Access

      Book Chapter

      Pages 4-23

      High Rate Convolutional Codes with Optimal Cycle Weights

    3. No Access

      Book Chapter

      Pages 24-34

      A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes

    4. No Access

      Book Chapter

      Pages 35-51

      Commitment Capacity of Discrete Memoryless Channels

    5. No Access

      Book Chapter

      Pages 52-65

      Separating and Intersecting Properties of BCH and Kasami Codes

  3. Applications of Coding in Cryptography

    1. No Access

      Book Chapter

      Pages 66-66

      Analysis and Design of Modern Stream Ciphers

    2. No Access

      Book Chapter

      Pages 67-81

      Improved Fast Correlation Attack Using Low Rate Codes

    3. No Access

      Book Chapter

      Pages 82-92

      On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions

    4. No Access

      Book Chapter

      Pages 93-114

      Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class

    5. No Access

      Book Chapter

      Pages 115-124

      Differential Uniformity for Arrays

  4. Cryptography

    1. No Access

      Book Chapter

      Pages 125-132

      Uses and Abuses of Cryptography

    2. No Access

      Book Chapter

      Pages 133-151

      A Designer’s Guide to KEMs

    3. No Access

      Book Chapter

      Pages 152-166

      A General Construction of IND-CCA2 Secure Public Key Encryption

    4. No Access

      Book Chapter

      Pages 167-182

      Efficient Key Updating Signature Schemes Based on IBS

    5. No Access

      Book Chapter

      Pages 183-189

      Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity

  5. Cryptanalysis

    1. No Access

      Book Chapter

      Pages 190-206

      Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic

    2. No Access

      Book Chapter

      Pages 207-222

      Resolving Large Prime(s) Variants for Discrete Logarithm Computation

    3. No Access

      Book Chapter

      Pages 223-233

      Computing the M = UU t Integer Matrix Decomposition

    4. No Access

      Book Chapter

      Pages 234-244

      Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups

    5. No Access

      Book Chapter

      Pages 245-263

      More Detail for a Combined Timing and Power Attack against Implementations of RSA

previous Page of 2