The Resource Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)

Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)

Label
Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings
Title
Cryptography and coding
Title remainder
8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings
Statement of responsibility
Bahram Honary (ed.)
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
ORU
Illustrations
illustrations
Index
index present
LC call number
  • QA268
  • N6916
LC item number
  • .C76 2001
  • .E5
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorName
Honary, Bahram
http://library.link/vocab/subjectName
  • Coding theory
  • Cryptography
  • Geheimschrift
  • Codage
  • Cryptographie
  • Coding theory
  • Cryptography
  • Geheimschrift
  • Cryptographie
  • Codage
  • signature numérique
  • nombre aléatoire
  • sécurité système
  • sécurité information
  • décodage
  • code correcteur erreur
  • codage
  • cryptographie
Label
Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)
Instantiates
Publication
Bibliography note
Includes bibliographical references
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
A Statistical Decoding Algorithm for General Linear Block Codes / A. Al Jabri -- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory / Christoph Lange and Andreas Ahrens -- The Complete Weight Enumerator for Codes over [actual symbol not reproducible] / Irfan Siap -- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem / Maki Yoshida and Toru Fujiwara -- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes / Simon Hirst and Bahram Honary -- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks / Manfred von Willich -- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs / Karl Brincat and Chris J. Mitchell -- The Exact Security of ECIES in the Generic Group Model / N. P. Smart -- A New Ultrafast Stream Cipher Design: COS Ciphers / Eric Filiol and Caroline Fontaine -- On Rabin-Type Signatures / Marc Joye and Jean-Jacques Quisquater -- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) / Seungjoo Kim, Jung Hee Cheon and Marc Joye / [et al.] -- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps / F. Javier Galan-Simon, Edgar Martinez-Moro and Juan G. Tena-Ayuso -- Almost-Certainly Runlength-Limiting Codes / David J. C. MacKay -- Weight vs. Magnetization Enumerator for Gallager Codes / Jort van Mourik, David Saad and Yoshiyuki Kabashima -- Graph Configurations and Decoding Performance / J. T. Paire, P. Coulton and P. G. Farrell -- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing / P. Benachour, P. G. Farrell and Bahram Honary -- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems / Ahmed Al-Dabbagh and Michael Darnell -- Improvement of the Delsarte Bound for [tau]-Designs in Finite Polynomial Metric Spaces / Svetla Nikova and Ventzislav Nikov -- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding / Shujun Li, Qi Li and Wenmin Li / [et al.] -- The Wide Trail Design Strategy / Joan Daemen and Vincent Rijmen -- Undetachable Threshold Signatures / Niklas Borselius, Chris J. Mitchell and Aaron Wilson -- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies / Werner Schindler, Francois Koeune and Jean-Jacques Quisquater -- Key Recovery Scheme Interoperability -- A Protocol for Mechanism Negotiation / Konstantinos Rantos and Chris J. Mitchell -- Unconditionally Secure Key Agreement Protocol / Cyril Prissette -- An Efficient Stream Cipher Alpha 1 for Mobile and Wireless Devices / N. Komninos, Bahram Honary and Michael Darnell -- Investigation of Linear Codes Possessing Some Extra Properties / Viktoriya Masol -- Statistical Physics of Low Density Parity Check Error Correcting Codes / David Saad, Yoshiyuki Kabashima and Tatsuto Murayama / [et al.] -- Generating Large Instances of the Gong-Harn Cryptosystem / Kenneth J. Giuliani and Guang Gong -- Lattice Attacks on RSA-Encrypted IP and TCP / P. A. Crouch and J. H. Davenport -- Spectrally Bounded Sequences, Codes, and States, Graph Constructions and Entanglement / Matthew G. Parker -- Attacking the Affine Parts of SFLASH / Willi Geiselmann, Rainer Steinwandt and Thomas Beth -- An Identity Based Encryption Scheme Based on Quadratic Residues / Clifford Cocks -- Another Way of Doing RSA Cryptography in Hardware / Lejla Batina and Geeke Muurling -- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers / Julio Cesar Hernandez, Jose Maria Sierra and Arturo Ribagorda / [et al.] -- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA / Seyed J. Tabatabaian, Sam Ikeshiro and Murat Gumussoy / [et al.] -- A New Undeniable Signature Scheme Using Smart Cards / Lee Jongkook, Ryu Shiryong and Kim Jeungseop / [et al.] -- Non-binary Block Inseparable Errors Control Codes / Alexandr Y. Lev, Yuliy A. Lev and Vyacheslav N. Okhrymenko -- Cryptanalysis of Nonlinear Filter Generators with {0,1}-Metric Viterbi Decoding / Sabine Leveiller, Joseph Boutros and Philippe Guillot / [et al.]
Dimensions
24 cm.
Dimensions
unknown
Extent
ix, 416 pages
Isbn
9783540430261
Lccn
2002280620
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)48765509
  • (OCoLC)ocm48765509
Label
Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)
Publication
Bibliography note
Includes bibliographical references
Carrier category
volume
Carrier category code
nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
A Statistical Decoding Algorithm for General Linear Block Codes / A. Al Jabri -- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory / Christoph Lange and Andreas Ahrens -- The Complete Weight Enumerator for Codes over [actual symbol not reproducible] / Irfan Siap -- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem / Maki Yoshida and Toru Fujiwara -- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes / Simon Hirst and Bahram Honary -- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks / Manfred von Willich -- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs / Karl Brincat and Chris J. Mitchell -- The Exact Security of ECIES in the Generic Group Model / N. P. Smart -- A New Ultrafast Stream Cipher Design: COS Ciphers / Eric Filiol and Caroline Fontaine -- On Rabin-Type Signatures / Marc Joye and Jean-Jacques Quisquater -- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) / Seungjoo Kim, Jung Hee Cheon and Marc Joye / [et al.] -- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps / F. Javier Galan-Simon, Edgar Martinez-Moro and Juan G. Tena-Ayuso -- Almost-Certainly Runlength-Limiting Codes / David J. C. MacKay -- Weight vs. Magnetization Enumerator for Gallager Codes / Jort van Mourik, David Saad and Yoshiyuki Kabashima -- Graph Configurations and Decoding Performance / J. T. Paire, P. Coulton and P. G. Farrell -- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing / P. Benachour, P. G. Farrell and Bahram Honary -- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems / Ahmed Al-Dabbagh and Michael Darnell -- Improvement of the Delsarte Bound for [tau]-Designs in Finite Polynomial Metric Spaces / Svetla Nikova and Ventzislav Nikov -- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding / Shujun Li, Qi Li and Wenmin Li / [et al.] -- The Wide Trail Design Strategy / Joan Daemen and Vincent Rijmen -- Undetachable Threshold Signatures / Niklas Borselius, Chris J. Mitchell and Aaron Wilson -- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies / Werner Schindler, Francois Koeune and Jean-Jacques Quisquater -- Key Recovery Scheme Interoperability -- A Protocol for Mechanism Negotiation / Konstantinos Rantos and Chris J. Mitchell -- Unconditionally Secure Key Agreement Protocol / Cyril Prissette -- An Efficient Stream Cipher Alpha 1 for Mobile and Wireless Devices / N. Komninos, Bahram Honary and Michael Darnell -- Investigation of Linear Codes Possessing Some Extra Properties / Viktoriya Masol -- Statistical Physics of Low Density Parity Check Error Correcting Codes / David Saad, Yoshiyuki Kabashima and Tatsuto Murayama / [et al.] -- Generating Large Instances of the Gong-Harn Cryptosystem / Kenneth J. Giuliani and Guang Gong -- Lattice Attacks on RSA-Encrypted IP and TCP / P. A. Crouch and J. H. Davenport -- Spectrally Bounded Sequences, Codes, and States, Graph Constructions and Entanglement / Matthew G. Parker -- Attacking the Affine Parts of SFLASH / Willi Geiselmann, Rainer Steinwandt and Thomas Beth -- An Identity Based Encryption Scheme Based on Quadratic Residues / Clifford Cocks -- Another Way of Doing RSA Cryptography in Hardware / Lejla Batina and Geeke Muurling -- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers / Julio Cesar Hernandez, Jose Maria Sierra and Arturo Ribagorda / [et al.] -- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA / Seyed J. Tabatabaian, Sam Ikeshiro and Murat Gumussoy / [et al.] -- A New Undeniable Signature Scheme Using Smart Cards / Lee Jongkook, Ryu Shiryong and Kim Jeungseop / [et al.] -- Non-binary Block Inseparable Errors Control Codes / Alexandr Y. Lev, Yuliy A. Lev and Vyacheslav N. Okhrymenko -- Cryptanalysis of Nonlinear Filter Generators with {0,1}-Metric Viterbi Decoding / Sabine Leveiller, Joseph Boutros and Philippe Guillot / [et al.]
Dimensions
24 cm.
Dimensions
unknown
Extent
ix, 416 pages
Isbn
9783540430261
Lccn
2002280620
Media category
unmediated
Media MARC source
rdamedia
Media type code
n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)48765509
  • (OCoLC)ocm48765509

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...