Conferences in DBLP
Kenneth G. Paterson Applications of Exponential Sums in Communications Theory. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:1-24 [Conf ] Svetla Nikova , Ventzislav Nikov Some Applications of Bounds for Designs to the Cryptography. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:25-34 [Conf ] Enes Pasalic , Thomas Johansson Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:35-44 [Conf ] Edgar Martínez-Moro , F. Javier Galán-Simón , Miguel A. Borges-Trenard , Mijail Borges-Quintana Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:45-55 [Conf ] Helen Donelan , Timothy O'Farrell A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:56-62 [Conf ] Stelios Georgiou , Christos Koukouvinos New Self-Dual Codes over GF(5). [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:63-69 [Conf ] Eric Filiol Designs, Intersecting Families, and Weight of Boolean Functions. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:70-80 [Conf ] Sean McGrath Coding Applications in Satellite Communication Systems. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:81-83 [Conf ] Xian Liu , Patrick G. Farrell , Colin Boyd A Unified Code. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:84-93 [Conf ] Paul Chippendale , Cagri Tanriover , Bahram Honary Enhanced Image Coding for Noisy Channels. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:94-103 [Conf ] George I. Davida , Yair Frankel Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:104-113 [Conf ] Thumrongrat Amornraksa , David R. B. Burgess , Peter Sweeney An Encoding Scheme for Dual Level Access to Broadcasting Networks. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:114-118 [Conf ] Bruno Bellamy , John S. Mason , Michael Ellis Photograph Signatures for the Protection of Identification Documents. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:119-128 [Conf ] Jean-Pierre Tillich , Gilles Zémor An Overview of the Isoperimetric Method in Coding Theory. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:129-134 [Conf ] Johannes Maucher , Vladimir Sidorenko , Martin Bossert Rectangular Basis of a Linear Code. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:135-143 [Conf ] Patrick G. Farrell , Seyed H. Razavi Graph Decoding of Array Error-Correcting Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:144-152 [Conf ] Conor O'Donoghue , Cyril Burkley Catastrophicity Test for Time-Varying Convolutional Encoders. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:153-162 [Conf ] Min-seok Oh , Peter Sweeney Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:163-172 [Conf ] Graham H. Norton , Ana Salagean On Efficient Decoding of Alternant Codes over a Commutative Ring. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:173-178 [Conf ] Jihye Gwak , Sooyoung Kim Shin , Hyung-Myung Kim Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:179-184 [Conf ] Lars R. Knudsen Advanced Encryption Standard (AES) - An Update. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:185- [Conf ] Zsolt Kukorelly The Piling-Up Lemma and Dependent Random Variables. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:186-190 [Conf ] Steven D. Galbraith , Nigel P. Smart A Cryptographic Application of Weil Descent. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:191-200 [Conf ] Renato Menicocci , Jovan Dj. Golic Edit Probability Correlation Attack on the Bilateral Stop/Go Generator. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:201-212 [Conf ] M. Anwarul Hasan Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:213-221 [Conf ] Siguna Müller On the Combined Fermat/Lucas Probable Prime Test. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:222-235 [Conf ] Solomon W. Golomb On the Cryptanalysis of Nonlinear Sequences. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:236-242 [Conf ] Simon Blake-Wilson Securing Aeronautical Telecommunications. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:243- [Conf ] Roger Fischlin , Jean-Pierre Seifert Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:244-257 [Conf ] Yi Mu , Vijay Varadharajan , Khanh Quoc Nguyen Delegated Decryption. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:258-269 [Conf ] Boris Ryabko , Andrei Fionov Fast and Space-Efficient Adaptive Arithmetic Coding. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:270-279 [Conf ] Ari Moesriami Barmawi , Shingo Takada , Norihisa Doi Robust Protocol for Generating Shared RSA Parameters. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:280-289 [Conf ] Stephan Wesemeyer , Peter Sweeney , David R. B. Burgess Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:290-299 [Conf ] Simon R. Blackburn , Simon Blake-Wilson , Mike Burmester , Steven D. Galbraith Weaknesses in Shared RSA Key Generation Protocols. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:300-306 [Conf ] Chan Yeob Yeun Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:307-0 [Conf ]