Borrow it
- African Studies Library
- Alumni Medical Library
- Astronomy Library
- Fineman and Pappas Law Libraries
- Frederick S. Pardee Management Library
- Howard Gotlieb Archival Research Center
- Mugar Memorial Library
- Music Library
- Pikering Educational Resources Library
- School of Theology Library
- Science & Engineering Library
- Stone Science Library
The Resource Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)
Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)
Resource Information
The item Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
- Language
- eng
- Extent
- ix, 416 pages
- Contents
-
- A Statistical Decoding Algorithm for General Linear Block Codes / A. Al Jabri
- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory / Christoph Lange and Andreas Ahrens
- The Complete Weight Enumerator for Codes over [actual symbol not reproducible] / Irfan Siap
- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem / Maki Yoshida and Toru Fujiwara
- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes / Simon Hirst and Bahram Honary
- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks / Manfred von Willich
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs / Karl Brincat and Chris J. Mitchell
- The Exact Security of ECIES in the Generic Group Model / N. P. Smart
- A New Ultrafast Stream Cipher Design: COS Ciphers / Eric Filiol and Caroline Fontaine
- On Rabin-Type Signatures / Marc Joye and Jean-Jacques Quisquater
- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) / Seungjoo Kim, Jung Hee Cheon and Marc Joye / [et al.]
- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps / F. Javier Galan-Simon, Edgar Martinez-Moro and Juan G. Tena-Ayuso
- Almost-Certainly Runlength-Limiting Codes / David J. C. MacKay
- Weight vs. Magnetization Enumerator for Gallager Codes / Jort van Mourik, David Saad and Yoshiyuki Kabashima
- Graph Configurations and Decoding Performance / J. T. Paire, P. Coulton and P. G. Farrell
- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing / P. Benachour, P. G. Farrell and Bahram Honary
- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems / Ahmed Al-Dabbagh and Michael Darnell
- Improvement of the Delsarte Bound for [tau]-Designs in Finite Polynomial Metric Spaces / Svetla Nikova and Ventzislav Nikov
- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding / Shujun Li, Qi Li and Wenmin Li / [et al.]
- The Wide Trail Design Strategy / Joan Daemen and Vincent Rijmen
- Undetachable Threshold Signatures / Niklas Borselius, Chris J. Mitchell and Aaron Wilson
- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies / Werner Schindler, Francois Koeune and Jean-Jacques Quisquater
- Key Recovery Scheme Interoperability
- A Protocol for Mechanism Negotiation / Konstantinos Rantos and Chris J. Mitchell
- Unconditionally Secure Key Agreement Protocol / Cyril Prissette
- An Efficient Stream Cipher Alpha 1 for Mobile and Wireless Devices / N. Komninos, Bahram Honary and Michael Darnell
- Investigation of Linear Codes Possessing Some Extra Properties / Viktoriya Masol
- Statistical Physics of Low Density Parity Check Error Correcting Codes / David Saad, Yoshiyuki Kabashima and Tatsuto Murayama / [et al.]
- Generating Large Instances of the Gong-Harn Cryptosystem / Kenneth J. Giuliani and Guang Gong
- Lattice Attacks on RSA-Encrypted IP and TCP / P. A. Crouch and J. H. Davenport
- Spectrally Bounded Sequences, Codes, and States, Graph Constructions and Entanglement / Matthew G. Parker
- Attacking the Affine Parts of SFLASH / Willi Geiselmann, Rainer Steinwandt and Thomas Beth
- An Identity Based Encryption Scheme Based on Quadratic Residues / Clifford Cocks
- Another Way of Doing RSA Cryptography in Hardware / Lejla Batina and Geeke Muurling
- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers / Julio Cesar Hernandez, Jose Maria Sierra and Arturo Ribagorda / [et al.]
- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA / Seyed J. Tabatabaian, Sam Ikeshiro and Murat Gumussoy / [et al.]
- A New Undeniable Signature Scheme Using Smart Cards / Lee Jongkook, Ryu Shiryong and Kim Jeungseop / [et al.]
- Non-binary Block Inseparable Errors Control Codes / Alexandr Y. Lev, Yuliy A. Lev and Vyacheslav N. Okhrymenko
- Cryptanalysis of Nonlinear Filter Generators with {0,1}-Metric Viterbi Decoding / Sabine Leveiller, Joseph Boutros and Philippe Guillot / [et al.]
- Isbn
- 9783540430261
- Label
- Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings
- Title
- Cryptography and coding
- Title remainder
- 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings
- Statement of responsibility
- Bahram Honary (ed.)
- Subject
-
- Codage -- Congrès
- Codage -- Congrès
- Coding theory
- Coding theory -- Congresses
- Conference papers and proceedings
- Cryptographie -- Congrès
- Cryptographie -- Congrès
- Cryptography
- Cryptography -- Congresses
- Geheimschrift
- Geheimschrift
- codage
- code correcteur erreur
- cryptographie
- décodage
- nombre aléatoire
- signature numérique
- sécurité information
- sécurité système
- Language
- eng
- Cataloging source
- ORU
- Illustrations
- illustrations
- Index
- index present
- LC call number
-
- QA268
- N6916
- LC item number
-
- .C76 2001
- .E5
- Literary form
- non fiction
- Nature of contents
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Honary, Bahram
- http://library.link/vocab/subjectName
-
- Coding theory
- Cryptography
- Geheimschrift
- Codage
- Cryptographie
- Coding theory
- Cryptography
- Geheimschrift
- Cryptographie
- Codage
- signature numérique
- nombre aléatoire
- sécurité système
- sécurité information
- décodage
- code correcteur erreur
- codage
- cryptographie
- Label
- Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)
- Bibliography note
- Includes bibliographical references
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- A Statistical Decoding Algorithm for General Linear Block Codes / A. Al Jabri -- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory / Christoph Lange and Andreas Ahrens -- The Complete Weight Enumerator for Codes over [actual symbol not reproducible] / Irfan Siap -- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem / Maki Yoshida and Toru Fujiwara -- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes / Simon Hirst and Bahram Honary -- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks / Manfred von Willich -- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs / Karl Brincat and Chris J. Mitchell -- The Exact Security of ECIES in the Generic Group Model / N. P. Smart -- A New Ultrafast Stream Cipher Design: COS Ciphers / Eric Filiol and Caroline Fontaine -- On Rabin-Type Signatures / Marc Joye and Jean-Jacques Quisquater -- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) / Seungjoo Kim, Jung Hee Cheon and Marc Joye / [et al.] -- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps / F. Javier Galan-Simon, Edgar Martinez-Moro and Juan G. Tena-Ayuso -- Almost-Certainly Runlength-Limiting Codes / David J. C. MacKay -- Weight vs. Magnetization Enumerator for Gallager Codes / Jort van Mourik, David Saad and Yoshiyuki Kabashima -- Graph Configurations and Decoding Performance / J. T. Paire, P. Coulton and P. G. Farrell -- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing / P. Benachour, P. G. Farrell and Bahram Honary -- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems / Ahmed Al-Dabbagh and Michael Darnell -- Improvement of the Delsarte Bound for [tau]-Designs in Finite Polynomial Metric Spaces / Svetla Nikova and Ventzislav Nikov -- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding / Shujun Li, Qi Li and Wenmin Li / [et al.] -- The Wide Trail Design Strategy / Joan Daemen and Vincent Rijmen -- Undetachable Threshold Signatures / Niklas Borselius, Chris J. Mitchell and Aaron Wilson -- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies / Werner Schindler, Francois Koeune and Jean-Jacques Quisquater -- Key Recovery Scheme Interoperability -- A Protocol for Mechanism Negotiation / Konstantinos Rantos and Chris J. Mitchell -- Unconditionally Secure Key Agreement Protocol / Cyril Prissette -- An Efficient Stream Cipher Alpha 1 for Mobile and Wireless Devices / N. Komninos, Bahram Honary and Michael Darnell -- Investigation of Linear Codes Possessing Some Extra Properties / Viktoriya Masol -- Statistical Physics of Low Density Parity Check Error Correcting Codes / David Saad, Yoshiyuki Kabashima and Tatsuto Murayama / [et al.] -- Generating Large Instances of the Gong-Harn Cryptosystem / Kenneth J. Giuliani and Guang Gong -- Lattice Attacks on RSA-Encrypted IP and TCP / P. A. Crouch and J. H. Davenport -- Spectrally Bounded Sequences, Codes, and States, Graph Constructions and Entanglement / Matthew G. Parker -- Attacking the Affine Parts of SFLASH / Willi Geiselmann, Rainer Steinwandt and Thomas Beth -- An Identity Based Encryption Scheme Based on Quadratic Residues / Clifford Cocks -- Another Way of Doing RSA Cryptography in Hardware / Lejla Batina and Geeke Muurling -- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers / Julio Cesar Hernandez, Jose Maria Sierra and Arturo Ribagorda / [et al.] -- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA / Seyed J. Tabatabaian, Sam Ikeshiro and Murat Gumussoy / [et al.] -- A New Undeniable Signature Scheme Using Smart Cards / Lee Jongkook, Ryu Shiryong and Kim Jeungseop / [et al.] -- Non-binary Block Inseparable Errors Control Codes / Alexandr Y. Lev, Yuliy A. Lev and Vyacheslav N. Okhrymenko -- Cryptanalysis of Nonlinear Filter Generators with {0,1}-Metric Viterbi Decoding / Sabine Leveiller, Joseph Boutros and Philippe Guillot / [et al.]
- Dimensions
- 24 cm.
- Dimensions
- unknown
- Extent
- ix, 416 pages
- Isbn
- 9783540430261
- Lccn
- 2002280620
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations
- Specific material designation
- remote
- System control number
-
- (OCoLC)48765509
- (OCoLC)ocm48765509
- Label
- Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)
- Bibliography note
- Includes bibliographical references
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- A Statistical Decoding Algorithm for General Linear Block Codes / A. Al Jabri -- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory / Christoph Lange and Andreas Ahrens -- The Complete Weight Enumerator for Codes over [actual symbol not reproducible] / Irfan Siap -- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem / Maki Yoshida and Toru Fujiwara -- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes / Simon Hirst and Bahram Honary -- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks / Manfred von Willich -- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs / Karl Brincat and Chris J. Mitchell -- The Exact Security of ECIES in the Generic Group Model / N. P. Smart -- A New Ultrafast Stream Cipher Design: COS Ciphers / Eric Filiol and Caroline Fontaine -- On Rabin-Type Signatures / Marc Joye and Jean-Jacques Quisquater -- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) / Seungjoo Kim, Jung Hee Cheon and Marc Joye / [et al.] -- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps / F. Javier Galan-Simon, Edgar Martinez-Moro and Juan G. Tena-Ayuso -- Almost-Certainly Runlength-Limiting Codes / David J. C. MacKay -- Weight vs. Magnetization Enumerator for Gallager Codes / Jort van Mourik, David Saad and Yoshiyuki Kabashima -- Graph Configurations and Decoding Performance / J. T. Paire, P. Coulton and P. G. Farrell -- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing / P. Benachour, P. G. Farrell and Bahram Honary -- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems / Ahmed Al-Dabbagh and Michael Darnell -- Improvement of the Delsarte Bound for [tau]-Designs in Finite Polynomial Metric Spaces / Svetla Nikova and Ventzislav Nikov -- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding / Shujun Li, Qi Li and Wenmin Li / [et al.] -- The Wide Trail Design Strategy / Joan Daemen and Vincent Rijmen -- Undetachable Threshold Signatures / Niklas Borselius, Chris J. Mitchell and Aaron Wilson -- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies / Werner Schindler, Francois Koeune and Jean-Jacques Quisquater -- Key Recovery Scheme Interoperability -- A Protocol for Mechanism Negotiation / Konstantinos Rantos and Chris J. Mitchell -- Unconditionally Secure Key Agreement Protocol / Cyril Prissette -- An Efficient Stream Cipher Alpha 1 for Mobile and Wireless Devices / N. Komninos, Bahram Honary and Michael Darnell -- Investigation of Linear Codes Possessing Some Extra Properties / Viktoriya Masol -- Statistical Physics of Low Density Parity Check Error Correcting Codes / David Saad, Yoshiyuki Kabashima and Tatsuto Murayama / [et al.] -- Generating Large Instances of the Gong-Harn Cryptosystem / Kenneth J. Giuliani and Guang Gong -- Lattice Attacks on RSA-Encrypted IP and TCP / P. A. Crouch and J. H. Davenport -- Spectrally Bounded Sequences, Codes, and States, Graph Constructions and Entanglement / Matthew G. Parker -- Attacking the Affine Parts of SFLASH / Willi Geiselmann, Rainer Steinwandt and Thomas Beth -- An Identity Based Encryption Scheme Based on Quadratic Residues / Clifford Cocks -- Another Way of Doing RSA Cryptography in Hardware / Lejla Batina and Geeke Muurling -- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers / Julio Cesar Hernandez, Jose Maria Sierra and Arturo Ribagorda / [et al.] -- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA / Seyed J. Tabatabaian, Sam Ikeshiro and Murat Gumussoy / [et al.] -- A New Undeniable Signature Scheme Using Smart Cards / Lee Jongkook, Ryu Shiryong and Kim Jeungseop / [et al.] -- Non-binary Block Inseparable Errors Control Codes / Alexandr Y. Lev, Yuliy A. Lev and Vyacheslav N. Okhrymenko -- Cryptanalysis of Nonlinear Filter Generators with {0,1}-Metric Viterbi Decoding / Sabine Leveiller, Joseph Boutros and Philippe Guillot / [et al.]
- Dimensions
- 24 cm.
- Dimensions
- unknown
- Extent
- ix, 416 pages
- Isbn
- 9783540430261
- Lccn
- 2002280620
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations
- Specific material designation
- remote
- System control number
-
- (OCoLC)48765509
- (OCoLC)ocm48765509
Subject
- Codage -- Congrès
- Codage -- Congrès
- Coding theory
- Coding theory -- Congresses
- Conference papers and proceedings
- Cryptographie -- Congrès
- Cryptographie -- Congrès
- Cryptography
- Cryptography -- Congresses
- Geheimschrift
- Geheimschrift
- codage
- code correcteur erreur
- cryptographie
- décodage
- nombre aléatoire
- signature numérique
- sécurité information
- sécurité système
Genre
Member of
Library Locations
-
African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 -71.105717
-
Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 -71.107023
-
Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 -71.099547
-
Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 -71.108227
-
Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 -71.101425
-
School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 -71.107235
-
Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 -71.102257
-
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Cryptography-and-coding--8th-IMA-international/KTwvoAw7KZU/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Cryptography-and-coding--8th-IMA-international/KTwvoAw7KZU/">Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Cryptography-and-coding--8th-IMA-international/KTwvoAw7KZU/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Cryptography-and-coding--8th-IMA-international/KTwvoAw7KZU/">Cryptography and coding : 8th IMA international conference, Cirencester, UK, December 17-19, 2001 : proceedings, Bahram Honary (ed.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>