The SCEAS System
Navigation Menu

Conferences in DBLP

IMA Conference on Cryptography and Coding (ima)
2001 (conf/ima/2001)

  1. A. Kh. Al Jabri
    A Statistical Decoding Algorithm for General Linear Block Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:1-8 [Conf]
  2. Christoph Lange, Andreas Ahrens
    On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:9-19 [Conf]
  3. Irfan Siap
    The Complete Weight Enumerator for Codes over Mn×s(Fq). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:20-26 [Conf]
  4. Maki Yoshida, Toru Fujiwara
    Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:27-37 [Conf]
  5. Simon Hirst, Bahram Honary
    A Simple Soft-Input/Soft-Output Decoder for Hamming Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:38-43 [Conf]
  6. Manfred von Willich
    A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:44-62 [Conf]
  7. Karl Brincat, Chris J. Mitchell
    Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:63-72 [Conf]
  8. Nigel P. Smart
    The Exact Security of ECIES in the Generic Group Model. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:73-84 [Conf]
  9. Eric Filiol, Caroline Fontaine
    A New Ultrafast Stream Cipher Design: COS Ciphers. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:85-98 [Conf]
  10. Marc Joye, Jean-Jacques Quisquater
    On Rabin-Type Signatures. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:99-113 [Conf]
  11. Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
    Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:114-127 [Conf]
  12. F. Javier Galán-Simón, Edgar Martínez-Moro, Juan Tena Ayuso
    Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:128-137 [Conf]
  13. David J. C. MacKay
    Almost-Certainly Runlength-Limiting Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:138-147 [Conf]
  14. Jort van Mourik, David Saad, Yoshiyuki Kabashima
    Weight vs. Magnetization Enumerator for Gallager Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:148-157 [Conf]
  15. J. T. Paire, Paul Coulton, Patrick G. Farrell
    Graph Configurations and Decoding Performance. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:158-165 [Conf]
  16. Philip Benachour, Patrick G. Farrell, Bahram Honary
    A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:166-175 [Conf]
  17. Ahmed Al-Dabbagh, Michael Darnell
    The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:176-190 [Conf]
  18. Svetla Nikova, Ventzislav Nikov
    Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:191-204 [Conf]
  19. Shujun Li, Li Qi, Li Wenmin, Xuanqin Mou, Cai Yuanlong
    Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:205-221 [Conf]
  20. Joan Daemen, Vincent Rijmen
    The Wide Trail Design Strategy. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:222-238 [Conf]
  21. Niklas Borselius, Chris J. Mitchell, Aaron Wilson
    Undetachable Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:239-244 [Conf]
  22. Werner Schindler, François Koeune, Jean-Jacques Quisquater
    Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:245-267 [Conf]
  23. Konstantinos Rantos, Chris J. Mitchell
    Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:268-276 [Conf]
  24. Cyril Prissette
    Unconditionally Secure Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:277-293 [Conf]
  25. N. Komninos, Bahram Honary, Michael Darnell
    An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:294-300 [Conf]
  26. Viktoriya Masol
    Investigation of Linear Codes Possessing Some Extra Properties. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:301-306 [Conf]
  27. David Saad, Yoshiyuki Kabashima, Tatsuto Murayama, Renato Vicente
    Statistical Physics of Low Density Parity Check Error Correcting Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:307-316 [Conf]
  28. Kenneth J. Giuliani, Guang Gong
    Generating Large Instances of the Gong-Harn Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:317-328 [Conf]
  29. Paul A. Crouch, James H. Davenport
    Lattice Attacks on RSA-Encrypted IP and TCP. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:329-338 [Conf]
  30. Matthew G. Parker
    Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:339-354 [Conf]
  31. Willi Geiselmann, Rainer Steinwandt, Thomas Beth
    Attacking the Affine Parts of SFLASH. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:355-359 [Conf]
  32. Clifford Cocks
    An Identity Based Encryption Scheme Based on Quadratic Residues. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:360-363 [Conf]
  33. Lejla Batina, Geeke Muurling
    Another Way of Doing RSA Cryptography in Hardware. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:364-373 [Conf]
  34. Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera
    Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:374-377 [Conf]
  35. Seyed J. Tabatabaian, Sam Ikeshiro, Murat Gumussoy, Mungal S. Dhanda
    A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:378-386 [Conf]
  36. Lee Jongkook, Ryu Shiryong, Kim Jeungseop, Yoo Keeyoung
    A New Undeniable Signature Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:387-394 [Conf]
  37. Alexandr Y. Lev, Yuliy A. Lev, Vyacheslav N. Okhrymenko
    Non-binary Block Inseparable Errors Control Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:395-401 [Conf]
  38. Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor
    Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:402-414 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002