Cryptography and Coding

8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings

  • Bahram Honary
Conference proceedings Cryptography and Coding 2001
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2260)

Table of contents

  1. Front Matter
    Pages I-IX
  2. Simon Hirst, Bahram Honary
    Pages 38-43
  3. Eric Filiol, Caroline Fontaine
    Pages 85-98
  4. Marc Joye, Jean-Jacques Quisquater
    Pages 99-113
  5. Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won et al.
    Pages 114-127
  6. F. Javier Galán-Simón, Edgar Martínez-Moro, Juan G. Tena-Ayuso
    Pages 128-137
  7. David J. C. MacKay
    Pages 138-147
  8. Jort van Mourik, David Saad, Yoshiyuki Kabashima
    Pages 148-157
  9. J. T. Paire, P. Coulton, P. G. Farrell
    Pages 158-165
  10. P. Benachour, P. G. Farrell, Bahram Honary
    Pages 166-175

About these proceedings

Introduction

The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of “Cryptography and Coding” was both timely and relevant. The theme of this conference was the future of coding and cryptography, which was touched upon in presentations by a number of invited speakers and researchers. The papers that appear in this book include recent research and development in error control coding and cryptography. These start with mathematical bounds, statistical decoding schemes for error correcting codes, and undetected error probabilities and continue with the theoretical aspects of error correction coding such as graph and trellis decoding, multifunctional and multiple access communication systems, low density parity check codes, and iterative decoding. These are followed by some papers on key recovery attack, authentication, stream cipher design, and analysis of ECIES algorithms, and lattice attacks on IP based protocols.

Keywords

DES algorithms coding communication crypto-system-design cryptography decoding algorithms digital signatures error-correcting code error-correcting codes finite field computations information security random numbers secure communications statistical decoding

Editors and affiliations

  • Bahram Honary
    • 1
  1. 1.Faculty of Applied Sciences, Department of Communication SystemsLancaster UniversityLancasterUK

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-45325-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-43026-1
  • Online ISBN 978-3-540-45325-3
  • Series Print ISSN 0302-9743