The SCEAS System
Navigation Menu

Conferences in DBLP

IMA Conference on Cryptography and Coding (ima)
2003 (conf/ima/2003)

  1. Patrick Guy Farrell
    Recent Developments in Array Error-Control Codes: (Invited Paper). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:1-3 [Conf]
  2. Eirik Rosnes, Øyvind Ytrehus
    High Rate Convolutional Codes with Optimal Cycle Weights. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:4-23 [Conf]
  3. Lina Fagoonee, Bahram Honary
    A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:24-34 [Conf]
  4. Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
    Commitment Capacity of Discrete Memoryless Channels. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:35-51 [Conf]
  5. Hans Georg Schaathun, Tor Helleseth
    Separating and Intersecting Properties of BCH and Kasami Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:52-65 [Conf]
  6. Thomas Johansson
    Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:66- [Conf]
  7. Håvard Molland, John Erik Mathiassen, Tor Helleseth
    Improved Fast Correlation Attack Using Low Rate Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:67-81 [Conf]
  8. Yuri Borissov, An Braeken, Svetla Nikova, Bart Preneel
    On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:82-92 [Conf]
  9. Enes Pasalic
    Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:93-114 [Conf]
  10. Kathy J. Horadam
    Differential Uniformity for Arrays. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:115-124 [Conf]
  11. Richard Walton
    Uses and Abuses of Cryptography (Invited Paper). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:125-132 [Conf]
  12. Alexander W. Dent
    A Designer's Guide to KEMs. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:133-151 [Conf]
  13. Eike Kiltz, John Malone-Lee
    A General Construction of IND-CCA2 Secure Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:152-166 [Conf]
  14. Dae Hyun Yum, Pil Joong Lee
    Efficient Key Updating Signature Schemes Based on IBS. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:167-182 [Conf]
  15. Harald Niederreiter, Igor Shparlinski
    Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:183-189 [Conf]
  16. Robert Granger
    Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:190-206 [Conf]
  17. Andrew J. Holt, James H. Davenport
    Resolving Large Prime(s) Variants for Discrete Logarithm Computation. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:207-222 [Conf]
  18. Katharina Geißler, Nigel P. Smart
    Computing the M = U Ut Integer Matrix Decomposition. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:223-233 [Conf]
  19. George Petrides
    Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:234-244 [Conf]
  20. Werner Schindler, Colin D. Walter
    More Detail for a Combined Timing and Power Attack against Implementations of RSA. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:245-263 [Conf]
  21. Simon R. Blackburn, Domingo Gomez-Perez, Jaime Gutierrez, Igor Shparlinski
    Predicting the Inversive Generator. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:264-275 [Conf]
  22. Werner Schindler
    A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:276-289 [Conf]
  23. Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida
    Analysis of Double Block Length Hash Functions. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:290-302 [Conf]
  24. Valtteri Niemi
    Cryptography in Wireless Standards: (Invited Paper). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:303-305 [Conf]
  25. Tetsu Iwata, Kaoru Kurosawa
    On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:306-318 [Conf]
  26. Geraint Price
    A General Attack Model on Hash-Based Client Puzzles. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:319-331 [Conf]
  27. Sattam S. Al-Riyami, Kenneth G. Paterson
    Tripartite Authenticated Key Agreement Protocols from Pairings. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:332-359 [Conf]
  28. Chris J. Mitchell
    Remote User Authentication Using Public Information. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:360-369 [Conf]
  29. Adam Barnett, Nigel P. Smart
    Mental Poker Revisited. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:370-383 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002