Cryptography and Coding

9th IMA International Conference, Cirencester, UK, December 16-18, 2003. Proceedings

  • Kenneth G. Paterson
Conference proceedings Cryptography and Coding 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2898)

Table of contents

  1. Front Matter
  2. Coding and Applications

    1. Patrick Guy Farrell
      Pages 1-3
    2. Eirik Rosnes, Øyvind Ytrehus
      Pages 4-23
    3. Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
      Pages 35-51
    4. Hans Georg Schaathun, Tor Helleseth
      Pages 52-65
  3. Applications of Coding in Cryptography

    1. Thomas Johansson
      Pages 66-66
    2. Håvard Molland, John Erik Mathiassen, Tor Helleseth
      Pages 67-81
    3. K. J. Horadam
      Pages 115-124
  4. Cryptography

    1. Richard Walton
      Pages 125-132
    2. Alexander W. Dent
      Pages 133-151
    3. Eike Kiltz, John Malone-Lee
      Pages 152-166
    4. Dae Hyun Yum, Pil Joong Lee
      Pages 167-182
  5. Cryptanalysis

    1. Andrew J. Holt, James H. Davenport
      Pages 207-222
    2. Katharina Geißler, Nigel P. Smart
      Pages 223-233
    3. Simon R. Blackburn, Domingo Gomez-Perez, Jaime Gutierrez, Igor E. Shparlinski
      Pages 264-275
    4. Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida
      Pages 290-302
  6. Network Security and Protocols

    1. Valtteri Niemi
      Pages 303-305
    2. Sattam S. Al-Riyami, Kenneth G. Paterson
      Pages 332-359
    3. Chris J. Mitchell
      Pages 360-369
    4. Adam Barnett, Nigel P. Smart
      Pages 370-383
  7. Back Matter

About these proceedings


The ninth in the series of IMA Conferences on Cryptography and Coding was held (as ever) at the Royal Agricultural College, Cirencester, from 16–18 Dec- ber 2003. The conference’s varied programme of 4 invited and 25 contributed papers is represented in this volume. The contributed papers were selected from the 49 submissions using a - reful refereeing process. The contributed and invited papers are grouped into 5 topics: coding and applications; applications of coding in cryptography; cryp- graphy; cryptanalysis; and network security and protocols. These topic headings represent the breadth of activity in the areas of coding, cryptography and c- munications, and the rich interplay between these areas. Assemblingtheconferenceprogrammeandthisproceedingsrequiredthehelp of many individuals. I would like to record my appreciation of them here. Firstly, I would like to thank the programme committee who aided me - mensely by evaluating the submissions, providing detailed written feedback for the authors of many of the papers, and advising me at many critical points - ring the process. Their help and cooperation was essential, especially in view of the short amount of time available to conduct the reviewing task. The c- mittee this year consisted of Mike Darnell, Mick Ganley, Bahram Honary, Chris Mitchell, Matthew Parker, Nigel Smart and Mike Walker.


authentication coding coding theory communications cryptographic attacks cryptography cryptology decoding encoding error-correcting codes finite field computations network security statistical decoding

Editors and affiliations

  • Kenneth G. Paterson
    • 1
  1. 1.Information Security Group, Royal HollowayUniversity of LondonEgham, SurreyU.K.

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20663-7
  • Online ISBN 978-3-540-40974-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site