rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540206637

Cryptography and Coding : 9th IMA International Conference, Cirencester, UK, December 2003 - Proceedings

by ; ;
  • ISBN13:

    9783540206637

  • ISBN10:

    3540206639

  • Format: Paperback
  • Copyright: 2004-02-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $109.00 Save up to $89.20
  • Digital
    $42.90
    Add to Cart

    DURATION
    PRICE

Summary

This book constitutes the refereed proceedings of the 9th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2003. The 25 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on coding and applications, applications of coding in cryptography, cryptography, cryptanalysis, network security and protocols.

Table of Contents

Recent Developments in Array Error-Control Codesp. 1
High Rate Convolutional Codes with Optimal Cycle Weightsp. 4
A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codesp. 24
Commitment Capacity of Discrete Memoryless Channelsp. 35
Separating and Intersecting Properties of BCH and Kasami Codesp. 52
Analysis and Design of Modern Stream Ciphersp. 66
Improved Fast Correlation Attack Using Low Rate Codesp. 67
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functionsp. 82
Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Classp. 93
Differential Uniformity for Arraysp. 115
Uses and Abuses of Cryptographyp. 125
A Designer's Guide to KEMsp. 133
A General Construction of IND-CCA2 Secure Public Key Encryptionp. 152
Efficient Key Updating Signature Schemes Based on IBSp. 167
Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexityp. 183
Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristicp. 190
Resolving Large Prime(s) Variants for Discrete Logarithm Computationp. 207
Computing the M=UU[superscript t] Integer Matrix Decompositionp. 223
Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groupsp. 234
More Detail for a Combined Timing and Power Attack against Implementations of RSAp. 245
Predicting the Inversive Generatorp. 264
A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002p. 276
Analysis of Double Block Length Hash Functionsp. 290
Cryptography in Wireless Standardsp. 303
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithmsp. 306
A General Attack Model on Hash-Based Client Puzzlesp. 319
Tripartite Authenticated Key Agreement Protocols from Pairingsp. 332
Remote User Authentication Using Public Informationp. 360
Mental Poker Revisitedp. 370
Author Indexp. 385
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program