IMACC C

39 papers

YearTitle / Authors
2001A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing.
Phillip Benachour, Patrick Guy Farrell, Bahram Honary
2001A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA.
Seyed J. Tabatabaian, Sam Ikeshiro, Murat Gumussoy, Mungal S. Dhanda
2001A New Ultrafast Stream Cipher Design: COS Ciphers.
Eric Filiol, Caroline Fontaine
2001A New Undeniable Signature Scheme Using Smart Cards.
Lee Jongkook, Ryu Shiryong, Kim Jeungseop, Yoo Keeyoung
2001A Simple Soft-Input/Soft-Output Decoder for Hamming Codes.
Simon Hirst, Bahram Honary
2001A Statistical Decoding Algorithm for General Linear Block Codes.
A. Kh. Al Jabri
2001A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks.
Manfred von Willich
2001Almost-Certainly Runlength-Limiting Codes.
David J. C. MacKay
2001An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices.
N. Komninos, Bahram Honary, Michael Darnell
2001An Identity Based Encryption Scheme Based on Quadratic Residues.
Clifford C. Cocks
2001Another Way of Doing RSA Cryptography in Hardware.
Lejla Batina, Geeke Muurling
2001Attacking the Affine Parts of SFLASH.
Willi Geiselmann, Rainer Steinwandt, Thomas Beth
2001Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding.
Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor
2001Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings
Bahram Honary
2001Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.
Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera
2001Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem.
Maki Yoshida, Toru Fujiwara
2001Generating Large Instances of the Gong-Harn Cryptosystem.
Kenneth J. Giuliani, Guang Gong
2001Graph Configurations and Decoding Performance.
J. T. Paire, Paul Coulton, Patrick Guy Farrell
2001Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces.
Svetla Nikova, Ventzislav Nikov
2001Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies.
Werner Schindler, François Koeune, Jean-Jacques Quisquater
2001Investigation of Linear Codes Possessing Some Extra Properties.
Viktoriya Masol
2001Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs.
Karl Brincat, Chris J. Mitchell
2001Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation.
Konstantinos Rantos, Chris J. Mitchell
2001Lattice Attacks on RSA-Encrypted IP and TCP.
Paul A. Crouch, James H. Davenport
2001Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps.
F. Javier Galán-Simón, Edgar Martínez-Moro, Juan Tena Ayuso
2001Non-binary Block Inseparable Errors Control Codes.
Alexandr Y. Lev, Yuliy A. Lev, Vyacheslav N. Okhrymenko
2001On Rabin-Type Signatures.
Marc Joye, Jean-Jacques Quisquater
2001On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory.
Christoph Lange, Andreas Ahrens
2001Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement.
Matthew Geoffrey Parker
2001Statistical Physics of Low Density Parity Check Error Correcting Codes.
David Saad, Yoshiyuki Kabashima, Tatsuto Murayama, Renato Vicente
2001Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding.
Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou, Yuanlong Cai
2001Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
2001The Complete Weight Enumerator for Codes over M
Irfan Siap
2001The Exact Security of ECIES in the Generic Group Model.
Nigel P. Smart
2001The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems.
Ahmed Al-Dabbagh, Michael Darnell
2001The Wide Trail Design Strategy.
Joan Daemen, Vincent Rijmen
2001Unconditionally Secure Key Agreement Protocol.
Cyril Prissette
2001Undetachable Threshold Signatures.
Niklas Borselius, Chris J. Mitchell, Aaron Wilson
2001Weight vs. Magnetization Enumerator for Gallager Codes.
Jort van Mourik, David Saad, Yoshiyuki Kabashima