Conferences in DBLP
A. Kh. Al Jabri A Statistical Decoding Algorithm for General Linear Block Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:1-8 [Conf ] Christoph Lange , Andreas Ahrens On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:9-19 [Conf ] Irfan Siap The Complete Weight Enumerator for Codes over Mn×s (Fq ). [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:20-26 [Conf ] Maki Yoshida , Toru Fujiwara Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:27-37 [Conf ] Simon Hirst , Bahram Honary A Simple Soft-Input/Soft-Output Decoder for Hamming Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:38-43 [Conf ] Manfred von Willich A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:44-62 [Conf ] Karl Brincat , Chris J. Mitchell Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:63-72 [Conf ] Nigel P. Smart The Exact Security of ECIES in the Generic Group Model. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:73-84 [Conf ] Eric Filiol , Caroline Fontaine A New Ultrafast Stream Cipher Design: COS Ciphers. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:85-98 [Conf ] Marc Joye , Jean-Jacques Quisquater On Rabin-Type Signatures. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:99-113 [Conf ] Seungjoo Kim , Jung Hee Cheon , Marc Joye , Seongan Lim , Masahiro Mambo , Dongho Won , Yuliang Zheng Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:114-127 [Conf ] F. Javier Galán-Simón , Edgar Martínez-Moro , Juan Tena Ayuso Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:128-137 [Conf ] David J. C. MacKay Almost-Certainly Runlength-Limiting Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:138-147 [Conf ] Jort van Mourik , David Saad , Yoshiyuki Kabashima Weight vs. Magnetization Enumerator for Gallager Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:148-157 [Conf ] J. T. Paire , Paul Coulton , Patrick G. Farrell Graph Configurations and Decoding Performance. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:158-165 [Conf ] Philip Benachour , Patrick G. Farrell , Bahram Honary A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:166-175 [Conf ] Ahmed Al-Dabbagh , Michael Darnell The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:176-190 [Conf ] Svetla Nikova , Ventzislav Nikov Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:191-204 [Conf ] Shujun Li , Li Qi , Li Wenmin , Xuanqin Mou , Cai Yuanlong Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:205-221 [Conf ] Joan Daemen , Vincent Rijmen The Wide Trail Design Strategy. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:222-238 [Conf ] Niklas Borselius , Chris J. Mitchell , Aaron Wilson Undetachable Threshold Signatures. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:239-244 [Conf ] Werner Schindler , François Koeune , Jean-Jacques Quisquater Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:245-267 [Conf ] Konstantinos Rantos , Chris J. Mitchell Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:268-276 [Conf ] Cyril Prissette Unconditionally Secure Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:277-293 [Conf ] N. Komninos , Bahram Honary , Michael Darnell An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:294-300 [Conf ] Viktoriya Masol Investigation of Linear Codes Possessing Some Extra Properties. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:301-306 [Conf ] David Saad , Yoshiyuki Kabashima , Tatsuto Murayama , Renato Vicente Statistical Physics of Low Density Parity Check Error Correcting Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:307-316 [Conf ] Kenneth J. Giuliani , Guang Gong Generating Large Instances of the Gong-Harn Cryptosystem. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:317-328 [Conf ] Paul A. Crouch , James H. Davenport Lattice Attacks on RSA-Encrypted IP and TCP. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:329-338 [Conf ] Matthew G. Parker Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:339-354 [Conf ] Willi Geiselmann , Rainer Steinwandt , Thomas Beth Attacking the Affine Parts of SFLASH. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:355-359 [Conf ] Clifford Cocks An Identity Based Encryption Scheme Based on Quadratic Residues. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:360-363 [Conf ] Lejla Batina , Geeke Muurling Another Way of Doing RSA Cryptography in Hardware. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:364-373 [Conf ] Julio César Hernández Castro , José María Sierra , Arturo Ribagorda , Benjamín Ramos , J. Carlos Mex-Perera Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:374-377 [Conf ] Seyed J. Tabatabaian , Sam Ikeshiro , Murat Gumussoy , Mungal S. Dhanda A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:378-386 [Conf ] Lee Jongkook , Ryu Shiryong , Kim Jeungseop , Yoo Keeyoung A New Undeniable Signature Scheme Using Smart Cards. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:387-394 [Conf ] Alexandr Y. Lev , Yuliy A. Lev , Vyacheslav N. Okhrymenko Non-binary Block Inseparable Errors Control Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:395-401 [Conf ] Sabine Leveiller , Joseph Boutros , Philippe Guillot , Gilles Zémor Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:402-414 [Conf ]