Conferences in DBLP
Patrick Guy Farrell Recent Developments in Array Error-Control Codes: (Invited Paper). [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:1-3 [Conf ] Eirik Rosnes , Øyvind Ytrehus High Rate Convolutional Codes with Optimal Cycle Weights. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:4-23 [Conf ] Lina Fagoonee , Bahram Honary A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:24-34 [Conf ] Andreas Winter , Anderson C. A. Nascimento , Hideki Imai Commitment Capacity of Discrete Memoryless Channels. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:35-51 [Conf ] Hans Georg Schaathun , Tor Helleseth Separating and Intersecting Properties of BCH and Kasami Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:52-65 [Conf ] Thomas Johansson Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:66- [Conf ] Håvard Molland , John Erik Mathiassen , Tor Helleseth Improved Fast Correlation Attack Using Low Rate Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:67-81 [Conf ] Yuri Borissov , An Braeken , Svetla Nikova , Bart Preneel On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:82-92 [Conf ] Enes Pasalic Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:93-114 [Conf ] Kathy J. Horadam Differential Uniformity for Arrays. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:115-124 [Conf ] Richard Walton Uses and Abuses of Cryptography (Invited Paper). [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:125-132 [Conf ] Alexander W. Dent A Designer's Guide to KEMs. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:133-151 [Conf ] Eike Kiltz , John Malone-Lee A General Construction of IND-CCA2 Secure Public Key Encryption. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:152-166 [Conf ] Dae Hyun Yum , Pil Joong Lee Efficient Key Updating Signature Schemes Based on IBS. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:167-182 [Conf ] Harald Niederreiter , Igor Shparlinski Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:183-189 [Conf ] Robert Granger Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:190-206 [Conf ] Andrew J. Holt , James H. Davenport Resolving Large Prime(s) Variants for Discrete Logarithm Computation. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:207-222 [Conf ] Katharina Geißler , Nigel P. Smart Computing the M = U Ut Integer Matrix Decomposition. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:223-233 [Conf ] George Petrides Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:234-244 [Conf ] Werner Schindler , Colin D. Walter More Detail for a Combined Timing and Power Attack against Implementations of RSA. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:245-263 [Conf ] Simon R. Blackburn , Domingo Gomez-Perez , Jaime Gutierrez , Igor Shparlinski Predicting the Inversive Generator. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:264-275 [Conf ] Werner Schindler A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:276-289 [Conf ] Mitsuhiro Hattori , Shoichi Hirose , Susumu Yoshida Analysis of Double Block Length Hash Functions. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:290-302 [Conf ] Valtteri Niemi Cryptography in Wireless Standards: (Invited Paper). [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:303-305 [Conf ] Tetsu Iwata , Kaoru Kurosawa On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:306-318 [Conf ] Geraint Price A General Attack Model on Hash-Based Client Puzzles. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:319-331 [Conf ] Sattam S. Al-Riyami , Kenneth G. Paterson Tripartite Authenticated Key Agreement Protocols from Pairings. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:332-359 [Conf ] Chris J. Mitchell Remote User Authentication Using Public Information. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:360-369 [Conf ] Adam Barnett , Nigel P. Smart Mental Poker Revisited. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:370-383 [Conf ]