IMACC C

30 papers

YearTitle / Authors
2003A Designer's Guide to KEMs.
Alexander W. Dent
2003A General Attack Model on Hash-Based Client Puzzles.
Geraint Price
2003A General Construction of IND-CCA2 Secure Public Key Encryption.
Eike Kiltz, John Malone-Lee
2003A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes.
Lina Fagoonee, Bahram Honary
2003A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002.
Werner Schindler
2003Analysis and Design of Modern Stream Ciphers: (Invited Paper) p.
Thomas Johansson
2003Analysis of Double Block Length Hash Functions.
Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida
2003Commitment Capacity of Discrete Memoryless Channels.
Andreas J. Winter, Anderson C. A. Nascimento, Hideki Imai
2003Computing the M = U U
Katharina Geißler, Nigel P. Smart
2003Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups.
George Petrides
2003Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings
Kenneth G. Paterson
2003Cryptography in Wireless Standards: (Invited Paper).
Valtteri Niemi
2003Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class.
Enes Pasalic
2003Differential Uniformity for Arrays.
Kathy J. Horadam
2003Efficient Key Updating Signature Schemes Based on IBS.
Dae Hyun Yum, Pil Joong Lee
2003Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic.
Robert Granger
2003High Rate Convolutional Codes with Optimal Cycle Weights.
Eirik Rosnes, Øyvind Ytrehus
2003Improved Fast Correlation Attack Using Low Rate Codes.
Håvard Molland, John Erik Mathiassen, Tor Helleseth
2003Mental Poker Revisited.
Adam Barnett, Nigel P. Smart
2003More Detail for a Combined Timing and Power Attack against Implementations of RSA.
Werner Schindler, Colin D. Walter
2003On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms.
Tetsu Iwata, Kaoru Kurosawa
2003On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions.
Yuri L. Borissov, An Braeken, Svetla Nikova, Bart Preneel
2003Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity.
Harald Niederreiter, Igor E. Shparlinski
2003Predicting the Inversive Generator.
Simon R. Blackburn, Domingo Gómez-Pérez, Jaime Gutierrez, Igor E. Shparlinski
2003Recent Developments in Array Error-Control Codes: (Invited Paper).
Patrick Guy Farrell
2003Remote User Authentication Using Public Information.
Chris J. Mitchell
2003Resolving Large Prime(s) Variants for Discrete Logarithm Computation.
Andrew J. Holt, James H. Davenport
2003Separating and Intersecting Properties of BCH and Kasami Codes.
Hans Georg Schaathun, Tor Helleseth
2003Tripartite Authenticated Key Agreement Protocols from Pairings.
Sattam S. Al-Riyami, Kenneth G. Paterson
2003Uses and Abuses of Cryptography (Invited Paper).
Richard Walton