The SCEAS System
Navigation Menu

Conferences in DBLP

IMA Conference on Cryptography and Coding (ima)
1999 (conf/ima/1999)

  1. Kenneth G. Paterson
    Applications of Exponential Sums in Communications Theory. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:1-24 [Conf]
  2. Svetla Nikova, Ventzislav Nikov
    Some Applications of Bounds for Designs to the Cryptography. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:25-34 [Conf]
  3. Enes Pasalic, Thomas Johansson
    Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:35-44 [Conf]
  4. Edgar Martínez-Moro, F. Javier Galán-Simón, Miguel A. Borges-Trenard, Mijail Borges-Quintana
    Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:45-55 [Conf]
  5. Helen Donelan, Timothy O'Farrell
    A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:56-62 [Conf]
  6. Stelios Georgiou, Christos Koukouvinos
    New Self-Dual Codes over GF(5). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:63-69 [Conf]
  7. Eric Filiol
    Designs, Intersecting Families, and Weight of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:70-80 [Conf]
  8. Sean McGrath
    Coding Applications in Satellite Communication Systems. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:81-83 [Conf]
  9. Xian Liu, Patrick G. Farrell, Colin Boyd
    A Unified Code. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:84-93 [Conf]
  10. Paul Chippendale, Cagri Tanriover, Bahram Honary
    Enhanced Image Coding for Noisy Channels. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:94-103 [Conf]
  11. George I. Davida, Yair Frankel
    Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:104-113 [Conf]
  12. Thumrongrat Amornraksa, David R. B. Burgess, Peter Sweeney
    An Encoding Scheme for Dual Level Access to Broadcasting Networks. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:114-118 [Conf]
  13. Bruno Bellamy, John S. Mason, Michael Ellis
    Photograph Signatures for the Protection of Identification Documents. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:119-128 [Conf]
  14. Jean-Pierre Tillich, Gilles Zémor
    An Overview of the Isoperimetric Method in Coding Theory. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:129-134 [Conf]
  15. Johannes Maucher, Vladimir Sidorenko, Martin Bossert
    Rectangular Basis of a Linear Code. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:135-143 [Conf]
  16. Patrick G. Farrell, Seyed H. Razavi
    Graph Decoding of Array Error-Correcting Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:144-152 [Conf]
  17. Conor O'Donoghue, Cyril Burkley
    Catastrophicity Test for Time-Varying Convolutional Encoders. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:153-162 [Conf]
  18. Min-seok Oh, Peter Sweeney
    Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:163-172 [Conf]
  19. Graham H. Norton, Ana Salagean
    On Efficient Decoding of Alternant Codes over a Commutative Ring. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:173-178 [Conf]
  20. Jihye Gwak, Sooyoung Kim Shin, Hyung-Myung Kim
    Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:179-184 [Conf]
  21. Lars R. Knudsen
    Advanced Encryption Standard (AES) - An Update. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:185- [Conf]
  22. Zsolt Kukorelly
    The Piling-Up Lemma and Dependent Random Variables. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:186-190 [Conf]
  23. Steven D. Galbraith, Nigel P. Smart
    A Cryptographic Application of Weil Descent. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:191-200 [Conf]
  24. Renato Menicocci, Jovan Dj. Golic
    Edit Probability Correlation Attack on the Bilateral Stop/Go Generator. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:201-212 [Conf]
  25. M. Anwarul Hasan
    Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:213-221 [Conf]
  26. Siguna Müller
    On the Combined Fermat/Lucas Probable Prime Test. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:222-235 [Conf]
  27. Solomon W. Golomb
    On the Cryptanalysis of Nonlinear Sequences. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:236-242 [Conf]
  28. Simon Blake-Wilson
    Securing Aeronautical Telecommunications. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:243- [Conf]
  29. Roger Fischlin, Jean-Pierre Seifert
    Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:244-257 [Conf]
  30. Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen
    Delegated Decryption. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:258-269 [Conf]
  31. Boris Ryabko, Andrei Fionov
    Fast and Space-Efficient Adaptive Arithmetic Coding. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:270-279 [Conf]
  32. Ari Moesriami Barmawi, Shingo Takada, Norihisa Doi
    Robust Protocol for Generating Shared RSA Parameters. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:280-289 [Conf]
  33. Stephan Wesemeyer, Peter Sweeney, David R. B. Burgess
    Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:290-299 [Conf]
  34. Simon R. Blackburn, Simon Blake-Wilson, Mike Burmester, Steven D. Galbraith
    Weaknesses in Shared RSA Key Generation Protocols. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:300-306 [Conf]
  35. Chan Yeob Yeun
    Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:307-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002