default search action
5th IMA 1995: Cirencester, UK
- Colin Boyd:
Cryptography and Coding, 5th IMA Conference, Cirencester, UK, December 18-20, 1995, Proceedings. Lecture Notes in Computer Science 1025, Springer 1995, ISBN 3-540-60693-9 - Paul C. van Oorschot:
Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement. 1 - Valeri Korjik, Michael Ivkov, Yuri Merinovich, Alexander Barg, Henk C. A. van Tilborg:
A Broadcast Key Distribution Scheme Based on Block Designs. 2-12 - Alexei E. Ashikhmin, Alexander Barg:
Minimal Supports in Linear Codes. 13 - Sooyoung Kim Shin, Peter Sweeney:
Sequential Decoding for a Subcode of Reed Solomon Codes. 14-21 - Pino Caballero-Gil, Amparo Fúster-Sabater:
Linear Span Analysis of a Set of Periodic Sequence Generators. 22-33 - Yongfei Han, Dieter Gollmann, Chris J. Mitchell:
Minimal Weight k-SR Representations. 34-43 - J. W. P. Hirschfeld:
The Main Conjecture for MDS Codes. 44-52 - Graham H. Norton:
Some Decoding Applications of Minimal Realization. 53-62 - Pingzhi Z. Fan, Michael Darnell:
The Synthesis of Perfect Sequences. 63-73 - Walter T. Penzhorn, G. J. Kühn:
Computation of Low-Weight Parity Checks for Correlation Attacks on Stream Ciphers. 74-83 - Chris J. Mitchell:
A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels. 84-93 - Hai Pang Ho, Peter Sweeney:
Soft Decision Decoding of Reed Solomon Codes Using the Dorsch Algorithm. 94-99 - David J. C. MacKay:
Good Codes Based on Very Sparse Matrices. 100-111 - Simon J. D. Phoenix, Paul D. Townsend:
Quantum Cryptography: Protecting our Future Networks with Quantum Mechanics. 112-131 - Cristian Radu, René Govaerts, Joos Vandewalle:
Prepaid Electronic Cheques Using Public-Key Certificates. 132-141 - Stefan Lucks:
How Traveling Salespersons Prove Their Identity. 142-149 - Andrew Smith, Colin Boyd:
An Elliptic Curve Analogue of McCurley's Key Agreement Scheme. 150-157 - M. Ahmadian-Attari, Patrick Guy Farrell:
Multi-Dimensional Ring TCM Codes for Fading Channels. 158-168 - Henk C. A. van Tilborg:
Authentication Codes: an Area where Coding and Cryptology Meet. 169-183 - Nicolas Sendrier:
Efficient Generation of Binary Words of Given Weight. 184-187 - Richard G. E. Pinch:
Distribution of Recurrent Sequences Modulo Prime Powers. 188-189 - Christian Cachin:
On-Line Secret Sharing. 190-198 - Vladimir A. Oleshchuk:
Church-Rosser Codes. 199-204 - Anne Canteaut:
A New Algorithm for Finding Minimum-Weight Words in Large Linear Codes. 205-212 - E. V. Stansfield, Michael Walker:
Coding and Cryptography for Speech and Vision. 213-236 - Victor V. Zyablov, Sergo Shavgulidze, Jørn Justesen:
Some Constructions of Generalised Concatenated Codes Based on Unit Memory Codes. 237-256 - Willi Geiselmann:
A Note on the Hash Function of Tillich and Zémor. 257-263 - Pascal Véron:
Cryptanalysis of Harari's Identification Scheme. 264-269 - T. M. Quirke, Michael Darnell:
Analysis of Sequence Segment Keying as a Method of CDMA Transmission. 270-281 - Victor Buttigieg, Patrick Guy Farrell:
Constructions for Variable-Length Error-Correcting Codes. 282-291
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.