Online Library TheLib.net » Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings
cover of the book Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings

Ebook: Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings

00
27.01.2024
0
0

The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of “Cryptography and Coding” was both timely and relevant. The theme of this conference was the future of coding and cryptography, which was touched upon in presentations by a number of invited speakers and researchers. The papers that appear in this book include recent research and development in error control coding and cryptography. These start with mathematical bounds, statistical decoding schemes for error correcting codes, and undetected error probabilities and continue with the theoretical aspects of error correction coding such as graph and trellis decoding, multifunctional and multiple access communication systems, low density parity check codes, and iterative decoding. These are followed by some papers on key recovery attack, authentication, stream cipher design, and analysis of ECIES algorithms, and lattice attacks on IP based protocols.




This book constitutes the refereed proceedings of the 8th International IMA Conference on Cryptography and Coding held in Cirencester, UK in December 2001. The 33 revised full papers presented together with four invited papers were carefully reviewed and selected from numerous submissions. Among the topics covered are mathematical bounds, statistical decoding schemes for error-correcting codes, multifunctional and multiple access communication systems, low density parity check codes, iterative coding, authentication, key recovery attacks, stream cipher design, analysis of ECIES algorithms, and lattice bases attacks on IP based protocols.


This book constitutes the refereed proceedings of the 8th International IMA Conference on Cryptography and Coding held in Cirencester, UK in December 2001. The 33 revised full papers presented together with four invited papers were carefully reviewed and selected from numerous submissions. Among the topics covered are mathematical bounds, statistical decoding schemes for error-correcting codes, multifunctional and multiple access communication systems, low density parity check codes, iterative coding, authentication, key recovery attacks, stream cipher design, analysis of ECIES algorithms, and lattice bases attacks on IP based protocols.
Content:
Front Matter....Pages I-IX
A Statistical Decoding Algorithm for General Linear Block Codes....Pages 1-8
On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory....Pages 9-19
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem....Pages 20-26
A Simple Soft-Input/Soft-Output Decoder for Hamming Codes....Pages 27-37
A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks....Pages 38-43
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs....Pages 44-62
The Exact Security of ECIES in the Generic Group Model....Pages 63-72
A New Ultrafast Stream Cipher Design: COS Ciphers....Pages 73-84
On Rabin-Type Signatures....Pages 85-98
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)....Pages 99-113
Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps....Pages 114-127
Almost-Certainly Runlength-Limiting Codes....Pages 128-137
Weight vs. Magnetization Enumerator for Gallager Codes....Pages 138-147
Graph Configurations and Decoding Performance....Pages 148-157
A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing....Pages 158-165
The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems....Pages 166-175
Improvement of the Delsarte Bound for ?-Designs in Finite Polynomial Metric Spaces....Pages 176-190
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding....Pages 191-204
The Wide Trail Design Strategy....Pages 205-221
Undetachable Threshold Signatures....Pages 222-238
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies....Pages 239-244
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation....Pages 245-267
Unconditionally Secure Key Agreement Protocol....Pages 268-276
An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices....Pages 277-293
Investigation of Linear Codes Possessing Some Extra Properties....Pages 294-300
Statistical Physics of Low Density Parity Check Error Correcting Codes....Pages 301-306
Generating Large Instances of the Gong-Harn Cryptosystem....Pages 307-316
Lattice Attacks on RSA-Encrypted IP and TCP....Pages 317-328
Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement....Pages 329-338
Attacking the Affine Parts of SFLASH....Pages 339-354
An Identity Based Encryption Scheme Based on Quadratic Residues....Pages 355-359
Another Way of Doing RSA Cryptography in Hardware....Pages 360-363
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers....Pages 364-373
A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA....Pages 374-377
A New Undeniable Signature Scheme Using Smart Cards....Pages 378-386
Non-binary Block Inseparable Errors Control Codes....Pages 387-394
Cryptanalysis of Nonlinear Filter Generators with (0, 1)-Metric Viterbi Decoding....Pages 395-401
Back Matter....Pages 402-414
....Pages 415-416
Download the book Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen