Skip to main content
  • Conference proceedings
  • © 2001

Cryptography and Coding

8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2260)

Conference series link(s): IMACC: IMA International Conference on Cryptography and Coding

Conference proceedings info: Cryptography and Coding 2001.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (38 papers)

  1. Front Matter

    Pages I-IX
  2. A Simple Soft-Input/Soft-Output Decoder for Hamming Codes

    • Simon Hirst, Bahram Honary
    Pages 38-43
  3. A New Ultrafast Stream Cipher Design: COS Ciphers

    • Eric Filiol, Caroline Fontaine
    Pages 85-98
  4. On Rabin-Type Signatures

    • Marc Joye, Jean-Jacques Quisquater
    Pages 99-113
  5. Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)

    • Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won et al.
    Pages 114-127
  6. Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps

    • F. Javier Galán-Simón, Edgar Martínez-Moro, Juan G. Tena-Ayuso
    Pages 128-137
  7. Almost-Certainly Runlength-Limiting Codes

    • David J. C. MacKay
    Pages 138-147
  8. Weight vs. Magnetization Enumerator for Gallager Codes

    • Jort van Mourik, David Saad, Yoshiyuki Kabashima
    Pages 148-157
  9. Graph Configurations and Decoding Performance

    • J. T. Paire, P. Coulton, P. G. Farrell
    Pages 158-165
  10. A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing

    • P. Benachour, P. G. Farrell, Bahram Honary
    Pages 166-175

Other Volumes

  1. Cryptography and Coding

About this book

The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of “Cryptography and Coding” was both timely and relevant. The theme of this conference was the future of coding and cryptography, which was touched upon in presentations by a number of invited speakers and researchers. The papers that appear in this book include recent research and development in error control coding and cryptography. These start with mathematical bounds, statistical decoding schemes for error correcting codes, and undetected error probabilities and continue with the theoretical aspects of error correction coding such as graph and trellis decoding, multifunctional and multiple access communication systems, low density parity check codes, and iterative decoding. These are followed by some papers on key recovery attack, authentication, stream cipher design, and analysis of ECIES algorithms, and lattice attacks on IP based protocols.

Editors and Affiliations

  • Faculty of Applied Sciences, Department of Communication Systems, Lancaster University, Lancaster, UK

    Bahram Honary

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access