default search action
6th IMA 1997: Cirencester, UK
- Michael Darnell:
Cryptography and Coding, 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings. Lecture Notes in Computer Science 1355, Springer 1997, ISBN 3-540-63927-6 - Ahmed Al-Dabbagh, Michael Darnell:
The Theory and Application of Reciprocal Pairs of Periodic Sequences. 1-16 - A. Kh. Al Jabri, S. Al-Issa:
Zero-Error Codes for Correlated Information Sources. 17-22 - Phillip Benachour, Garik Markarian, Bahram Honary:
Trellis Decoding Techniques and Their Performance in the Adder Channel for Synchronous and Asynchronous CCMA Codes. 23-29 - Simon Blake-Wilson, Don Johnson, Alfred Menezes:
Key Agreement Protocols and Their Security Analysis. 30-45 - James W. Bond, Stefan Hui, Hank Schmidt:
Low Density Parity Check Codes Based on Sparse Matrices with No Small Cycles. 46-58 - Karl Brincat, Alko Meijer:
On the SAFER Cryptosystem. 59-68 - K. L. Brown, Michael Darnell:
An Adaptive Approach to T of N User Multi-access Communications Channel Using an Orthogonal Coded Multiplexer. 69-73 - Frank L. Carter:
The Breaking of the Lorenz Cipher: An Introduction to the Theory behind the Operational Role of "Colossus" at BP. 74-88 - Clifford C. Cocks:
Split Knowledge Generation of RSA Parameters. 89-95 - Pingzhi Fan:
Analysis of Error Contol in Digital Trunked Radio Systems. 96-100 - Eric Filiol:
Reconstruction of Convolutional Encoders over GF(q). 101-109 - Sami Harari:
HCC: A Hash Function Using Error Correcting Codes. 110-117 - Erwin Hess:
Public-Key Cryptosystems Based on Elliptic Curves - An Evolutionary Approach. 118 - Bahram Honary, Bryn Thomas, Paul Coulton, Michael Darnell:
Novel Application of Turbo Decoding for Radio Channels. 119-130 - Nick Howgrave-Graham:
Finding Small Roots of Univariate Modular Equations Revisited. 131-142 - E. Husni, Peter Sweeney:
Robust Reed Solomon Coded MPSK Modulation. 143-154 - Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng:
RSA-type Signatures in the Presence of Transient Faults. 155-160 - Gregory Kabatianskii, E. A. Krouk, Ben J. M. Smeets:
A Digital Signature Scheme Based on Random Error-Correcting Codes. 161-167 - Vincent K. N. Lau, Malcolm D. Macleod:
Variable Rate Adaptive Trellis Coded QAM for High Bandwidth Efficiency Applications under Raleigh Fading Channel. 168-179 - Vincent K. N. Lau, Svetislav V. Maric:
Variable Rate Adaptive Channel Coding for Coherent and Non-coherent Raleigh Fading Channel. 180-191 - Bo Lin, Simon J. Shepherd:
LABYRINTH: a New Ultra High Speed Stream Cipher. 192-198 - Xian Liu, Patrick Guy Farrell, Colin Boyd:
Resisting the Bergen-Hogan Attack on Adaptive Arithmetic Coding. 199-208 - Garik Markarian, Phillip Benachour, Bahram Honary:
Novel Decoding Technique for the Synchronous and Quasi-synchronous Multiple Access Adder Channel. 209-220 - Keith M. Martin:
Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains. 221-232 - Johannes Maucher:
Multi Dimensional Compartment Schemes. 233-238 - S. McManus, Patrick Guy Farrell:
Evaluation of Standard Approximation to Log-likelihood Ratio Addition in the MAP Algorithm, and its Application in Block Code (Turbo) Iterative Decoding Algorithms. 239-250 - Wai Ho Mow:
Multiuser Coding Based on Detecting Matrices for Synchronous-CDMA Systems. 251-257 - Conor O'Donoghue, Cyril J. Burkley:
Enumeration of Convolutional Codes and Minimal Encoders. 258-264 - Richard G. E. Pinch:
On Using Carmichael Numbers for Public Key Encryption Systems. 265-269 - Bart Preneel:
Hash Functions and MAC Algorithms Based on Block Ciphers. 270-282 - Cristian Radu, René Govaerts, Joos Vandewalle:
Witness Hiding Restrictive Blind Signature Scheme. 283-294 - Markus Schneider:
A Note on the Construction and Upper Bounds of Correlation-Immune Functions. 295-306 - S. Sonander, Bahram Honary:
On Generalised Concatenated Codes. 307-316 - A. Tandon, Patrick Guy Farrell:
Error Performance Analysis of Different Interleaving Strategies Applied to Eight Track Digital Tape Systems. 317-322 - Andre Zuquete, Paulo Guedes:
Efficient Error-Propagating Block Chaining. 323-334
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.