Skip to main content
  • Conference proceedings
  • © 2005

Cryptography and Coding

10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3796)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): IMACC: IMA International Conference on Cryptography and Coding

Conference proceedings info: Cryptography and Coding 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

  2. Invited Papers

    1. Pairing-Based Cryptography at High Security Levels

      • Neal Koblitz, Alfred Menezes
      Pages 13-36
    2. Improved Decoding of Interleaved AG Codes

      • Andrew Brown, Lorenz Minder, Amin Shokrollahi
      Pages 37-46
  3. Coding Theory

    1. A Trellis-Based Bound on (2,1)-Separating Codes

      • Hans Georg Schaathun, Gérard D. Cohen
      Pages 59-67
    2. Tessellation Based Multiple Description Coding

      • Canhui Cai, Jing Chen
      Pages 68-77
    3. Exploiting Coding Theory for Collision Attacks on SHA-1

      • Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
      Pages 78-95
  4. Signatures and Signcryption

    1. Hash Based Digital Signature Schemes

      • C. Dods, N. P. Smart, M. Stam
      Pages 96-115
    2. Non-interactive Designated Verifier Proofs and Undeniable Signatures

      • Caroline Kudla, Kenneth G. Paterson
      Pages 136-154
  5. Symmetric Cryptography

    1. Partial Key Recovery Attacks on XCBC, TMAC and OMAC

      • Chris J. Mitchell
      Pages 155-167
    2. Domain Expansion of MACs: Alternative Uses of the FIL-MAC

      • Ueli Maurer, Johan Sjödin
      Pages 168-185
    3. Normality of Vectorial Functions

      • An Braeken, Christopher Wolf, Bart Preneel
      Pages 186-200
    4. Related-Key Differential Attacks on Cobra-H64 and Cobra-H128

      • Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon
      Pages 201-219
  6. Algebraic Cryptanalysis

    1. Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem

      • J. Ding, J. E. Gower, D. Schmidt, C. Wolf, Z. Yin
      Pages 262-277
    2. An Algebraic Framework for Cipher Embeddings

      • C. Cid, S. Murphy, M. J. B. Robshaw
      Pages 278-289

Other Volumes

  1. Cryptography and Coding

Reviews

From the reviews:

"This book contains selected refereed proceedings of the tenth Institute of Mathematics and its Applications (IMA) international conference. … The book covers some important research areas in coding and cryptography. … I think anyone who wants to study or design a system for crypto-protecting sensitive data will find useful information in this book. … Books such as this are vital to ensuring the progress of theoretical and practical studies on cryptography, one of the most important technologies in the field of computer and network security." (Patriciu Victor-Valeriu, Computing Reviews, August, 2006)

Editors and Affiliations

  • Dept. Computer Science, University of Bristol, Bristol, United Kingdom

    Nigel P. Smart

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access