


default search action
6th IMA 1997: Cirencester, UK
- Michael Darnell:

Cryptography and Coding, 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings. Lecture Notes in Computer Science 1355, Springer 1997, ISBN 3-540-63927-6 - Ahmed Al-Dabbagh, Michael Darnell:

The Theory and Application of Reciprocal Pairs of Periodic Sequences. 1-16 - A. Kh. Al Jabri, S. Al-Issa:

Zero-Error Codes for Correlated Information Sources. 17-22 - Phillip Benachour, Garik Markarian

, Bahram Honary:
Trellis Decoding Techniques and Their Performance in the Adder Channel for Synchronous and Asynchronous CCMA Codes. 23-29 - Simon Blake-Wilson, Don Johnson, Alfred Menezes:

Key Agreement Protocols and Their Security Analysis. 30-45 - James W. Bond, Stefan Hui, Hank Schmidt:

Low Density Parity Check Codes Based on Sparse Matrices with No Small Cycles. 46-58 - Karl Brincat, Alko Meijer:

On the SAFER Cryptosystem. 59-68 - K. L. Brown, Michael Darnell:

An Adaptive Approach to T of N User Multi-access Communications Channel Using an Orthogonal Coded Multiplexer. 69-73 - Frank L. Carter:

The Breaking of the Lorenz Cipher: An Introduction to the Theory behind the Operational Role of "Colossus" at BP. 74-88 - Clifford C. Cocks:

Split Knowledge Generation of RSA Parameters. 89-95 - Pingzhi Fan:

Analysis of Error Contol in Digital Trunked Radio Systems. 96-100 - Eric Filiol

:
Reconstruction of Convolutional Encoders over GF(q). 101-109 - Sami Harari:

HCC: A Hash Function Using Error Correcting Codes. 110-117 - Erwin Hess:

Public-Key Cryptosystems Based on Elliptic Curves - An Evolutionary Approach. 118 - Bahram Honary, Bryn Thomas, Paul Coulton, Michael Darnell:

Novel Application of Turbo Decoding for Radio Channels. 119-130 - Nick Howgrave-Graham:

Finding Small Roots of Univariate Modular Equations Revisited. 131-142 - E. Husni, Peter Sweeney:

Robust Reed Solomon Coded MPSK Modulation. 143-154 - Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng

:
RSA-type Signatures in the Presence of Transient Faults. 155-160 - Gregory Kabatianskii, E. A. Krouk, Ben J. M. Smeets:

A Digital Signature Scheme Based on Random Error-Correcting Codes. 161-167 - Vincent K. N. Lau, Malcolm D. Macleod

:
Variable Rate Adaptive Trellis Coded QAM for High Bandwidth Efficiency Applications under Raleigh Fading Channel. 168-179 - Vincent K. N. Lau, Svetislav V. Maric:

Variable Rate Adaptive Channel Coding for Coherent and Non-coherent Raleigh Fading Channel. 180-191 - Bo Lin, Simon J. Shepherd:

LABYRINTH: a New Ultra High Speed Stream Cipher. 192-198 - Xian Liu, Patrick Guy Farrell, Colin Boyd:

Resisting the Bergen-Hogan Attack on Adaptive Arithmetic Coding. 199-208 - Garik Markarian

, Phillip Benachour, Bahram Honary:
Novel Decoding Technique for the Synchronous and Quasi-synchronous Multiple Access Adder Channel. 209-220 - Keith M. Martin:

Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains. 221-232 - Johannes Maucher:

Multi Dimensional Compartment Schemes. 233-238 - S. McManus, Patrick Guy Farrell:

Evaluation of Standard Approximation to Log-likelihood Ratio Addition in the MAP Algorithm, and its Application in Block Code (Turbo) Iterative Decoding Algorithms. 239-250 - Wai Ho Mow:

Multiuser Coding Based on Detecting Matrices for Synchronous-CDMA Systems. 251-257 - Conor O'Donoghue, Cyril J. Burkley:

Enumeration of Convolutional Codes and Minimal Encoders. 258-264 - Richard G. E. Pinch:

On Using Carmichael Numbers for Public Key Encryption Systems. 265-269 - Bart Preneel:

Hash Functions and MAC Algorithms Based on Block Ciphers. 270-282 - Cristian Radu, René Govaerts, Joos Vandewalle:

Witness Hiding Restrictive Blind Signature Scheme. 283-294 - Markus Schneider:

A Note on the Construction and Upper Bounds of Correlation-Immune Functions. 295-306 - S. Sonander, Bahram Honary:

On Generalised Concatenated Codes. 307-316 - A. Tandon, Patrick Guy Farrell:

Error Performance Analysis of Different Interleaving Strategies Applied to Eight Track Digital Tape Systems. 317-322 - Andre Zuquete, Paulo Guedes:

Efficient Error-Propagating Block Chaining. 323-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














