The Resource Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)

Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)

Label
Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings
Title
Cryptography and coding
Title remainder
8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings
Statement of responsibility
Bahram Honary (ed.)
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
ORU
Illustrations
illustrations
Index
index present
LC call number
  • QA268
  • N6916
LC item number
  • .C76 2001
  • .E5
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorName
Honary, Bahram
http://library.link/vocab/subjectName
  • Coding theory
  • Cryptography
  • Geheimschrift
  • Codage
  • Cryptographie
  • Coding theory
  • Cryptography
  • Geheimschrift
  • Cryptographie
  • Codage
  • signature numérique
  • nombre aléatoire
  • sécurité système
  • sécurité information
  • décodage
  • code correcteur erreur
  • codage
  • cryptographie
Label
Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)
Instantiates
Publication
Bibliography note
Includes bibliographical references
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
A Statistical Decoding Algorithm for General Linear Block Codes / A. Al Jabri -- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory / Christoph Lange and Andreas Ahrens -- The Complete Weight Enumerator for Codes over [actual symbol not reproducible] / Irfan Siap -- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem / Maki Yoshida and Toru Fujiwara -- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes / Simon Hirst and Bahram Honary -- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks / Manfred von Willich -- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs / Karl Brincat and Chris J. Mitchell -- The Exact Security of ECIES in the Generic Group Model / N. P. Smart -- A New Ultrafast Stream Cipher Design: COS Ciphers / Eric Filiol and Caroline Fontaine -- On Rabin-Type Signatures / Marc Joye and Jean-Jacques Quisquater -- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) / Seungjoo Kim, Jung Hee Cheon and Marc Joye / [et al.] -- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps / F. Javier Galan-Simon, Edgar Martinez-Moro and Juan G. Tena-Ayuso -- Almost-Certainly Runlength-Limiting Codes / David J. C. MacKay -- Weight vs. Magnetization Enumerator for Gallager Codes / Jort van Mourik, David Saad and Yoshiyuki Kabashima -- Graph Configurations and Decoding Performance / J. T. Paire, P. Coulton and P. G. Farrell -- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing / P. Benachour, P. G. Farrell and Bahram Honary -- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems / Ahmed Al-Dabbagh and Michael Darnell -- Improvement of the Delsarte Bound for [tau]-Designs in Finite Polynomial Metric Spaces / Svetla Nikova and Ventzislav Nikov -- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding / Shujun Li, Qi Li and Wenmin Li / [et al.] -- The Wide Trail Design Strategy / Joan Daemen and Vincent Rijmen -- Undetachable Threshold Signatures / Niklas Borselius, Chris J. Mitchell and Aaron Wilson -- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies / Werner Schindler, Francois Koeune and Jean-Jacques Quisquater -- Key Recovery Scheme Interoperability -- A Protocol for Mechanism Negotiation / Konstantinos Rantos and Chris J. Mitchell -- Unconditionally Secure Key Agreement Protocol / Cyril Prissette -- An Efficient Stream Cipher Alpha 1 for Mobile and Wireless Devices / N. Komninos, Bahram Honary and Michael Darnell -- Investigation of Linear Codes Possessing Some Extra Properties / Viktoriya Masol -- Statistical Physics of Low Density Parity Check Error Correcting Codes / David Saad, Yoshiyuki Kabashima and Tatsuto Murayama / [et al.] -- Generating Large Instances of the Gong-Harn Cryptosystem / Kenneth J. Giuliani and Guang Gong -- Lattice Attacks on RSA-Encrypted IP and TCP / P. A. Crouch and J. H. Davenport -- Spectrally Bounded Sequences, Codes, and States, Graph Constructions and Entanglement / Matthew G. Parker -- Attacking the Affine Parts of SFLASH / Willi Geiselmann, Rainer Steinwandt and Thomas Beth -- An Identity Based Encryption Scheme Based on Quadratic Residues / Clifford Cocks -- Another Way of Doing RSA Cryptography in Hardware / Lejla Batina and Geeke Muurling -- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers / Julio Cesar Hernandez, Jose Maria Sierra and Arturo Ribagorda / [et al.] -- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA / Seyed J. Tabatabaian, Sam Ikeshiro and Murat Gumussoy / [et al.] -- A New Undeniable Signature Scheme Using Smart Cards / Lee Jongkook, Ryu Shiryong and Kim Jeungseop / [et al.] -- Non-binary Block Inseparable Errors Control Codes / Alexandr Y. Lev, Yuliy A. Lev and Vyacheslav N. Okhrymenko -- Cryptanalysis of Nonlinear Filter Generators with {0,1}-Metric Viterbi Decoding / Sabine Leveiller, Joseph Boutros and Philippe Guillot / [et al.]
Dimensions
24 cm.
Dimensions
unknown
Extent
ix, 416 pages
Isbn
9783540430261
Lccn
2002280620
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)48765509
  • (OCoLC)ocm48765509
Label
Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)
Publication
Bibliography note
Includes bibliographical references
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
A Statistical Decoding Algorithm for General Linear Block Codes / A. Al Jabri -- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory / Christoph Lange and Andreas Ahrens -- The Complete Weight Enumerator for Codes over [actual symbol not reproducible] / Irfan Siap -- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem / Maki Yoshida and Toru Fujiwara -- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes / Simon Hirst and Bahram Honary -- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks / Manfred von Willich -- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs / Karl Brincat and Chris J. Mitchell -- The Exact Security of ECIES in the Generic Group Model / N. P. Smart -- A New Ultrafast Stream Cipher Design: COS Ciphers / Eric Filiol and Caroline Fontaine -- On Rabin-Type Signatures / Marc Joye and Jean-Jacques Quisquater -- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) / Seungjoo Kim, Jung Hee Cheon and Marc Joye / [et al.] -- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps / F. Javier Galan-Simon, Edgar Martinez-Moro and Juan G. Tena-Ayuso -- Almost-Certainly Runlength-Limiting Codes / David J. C. MacKay -- Weight vs. Magnetization Enumerator for Gallager Codes / Jort van Mourik, David Saad and Yoshiyuki Kabashima -- Graph Configurations and Decoding Performance / J. T. Paire, P. Coulton and P. G. Farrell -- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing / P. Benachour, P. G. Farrell and Bahram Honary -- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems / Ahmed Al-Dabbagh and Michael Darnell -- Improvement of the Delsarte Bound for [tau]-Designs in Finite Polynomial Metric Spaces / Svetla Nikova and Ventzislav Nikov -- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding / Shujun Li, Qi Li and Wenmin Li / [et al.] -- The Wide Trail Design Strategy / Joan Daemen and Vincent Rijmen -- Undetachable Threshold Signatures / Niklas Borselius, Chris J. Mitchell and Aaron Wilson -- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies / Werner Schindler, Francois Koeune and Jean-Jacques Quisquater -- Key Recovery Scheme Interoperability -- A Protocol for Mechanism Negotiation / Konstantinos Rantos and Chris J. Mitchell -- Unconditionally Secure Key Agreement Protocol / Cyril Prissette -- An Efficient Stream Cipher Alpha 1 for Mobile and Wireless Devices / N. Komninos, Bahram Honary and Michael Darnell -- Investigation of Linear Codes Possessing Some Extra Properties / Viktoriya Masol -- Statistical Physics of Low Density Parity Check Error Correcting Codes / David Saad, Yoshiyuki Kabashima and Tatsuto Murayama / [et al.] -- Generating Large Instances of the Gong-Harn Cryptosystem / Kenneth J. Giuliani and Guang Gong -- Lattice Attacks on RSA-Encrypted IP and TCP / P. A. Crouch and J. H. Davenport -- Spectrally Bounded Sequences, Codes, and States, Graph Constructions and Entanglement / Matthew G. Parker -- Attacking the Affine Parts of SFLASH / Willi Geiselmann, Rainer Steinwandt and Thomas Beth -- An Identity Based Encryption Scheme Based on Quadratic Residues / Clifford Cocks -- Another Way of Doing RSA Cryptography in Hardware / Lejla Batina and Geeke Muurling -- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers / Julio Cesar Hernandez, Jose Maria Sierra and Arturo Ribagorda / [et al.] -- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA / Seyed J. Tabatabaian, Sam Ikeshiro and Murat Gumussoy / [et al.] -- A New Undeniable Signature Scheme Using Smart Cards / Lee Jongkook, Ryu Shiryong and Kim Jeungseop / [et al.] -- Non-binary Block Inseparable Errors Control Codes / Alexandr Y. Lev, Yuliy A. Lev and Vyacheslav N. Okhrymenko -- Cryptanalysis of Nonlinear Filter Generators with {0,1}-Metric Viterbi Decoding / Sabine Leveiller, Joseph Boutros and Philippe Guillot / [et al.]
Dimensions
24 cm.
Dimensions
unknown
Extent
ix, 416 pages
Isbn
9783540430261
Lccn
2002280620
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
Specific material designation
remote
System control number
  • (OCoLC)48765509
  • (OCoLC)ocm48765509

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...