


default search action
5th IMA 1995: Cirencester, UK
- Colin Boyd:

Cryptography and Coding, 5th IMA Conference, Cirencester, UK, December 18-20, 1995, Proceedings. Lecture Notes in Computer Science 1025, Springer 1995, ISBN 3-540-60693-9 - Paul C. van Oorschot:

Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement. 1 - Valeri Korjik, Michael Ivkov, Yuri Merinovich, Alexander Barg, Henk C. A. van Tilborg:

A Broadcast Key Distribution Scheme Based on Block Designs. 2-12 - Alexei E. Ashikhmin, Alexander Barg:

Minimal Supports in Linear Codes. 13 - Sooyoung Kim Shin

, Peter Sweeney:
Sequential Decoding for a Subcode of Reed Solomon Codes. 14-21 - Pino Caballero-Gil

, Amparo Fúster-Sabater:
Linear Span Analysis of a Set of Periodic Sequence Generators. 22-33 - Yongfei Han, Dieter Gollmann, Chris J. Mitchell

:
Minimal Weight k-SR Representations. 34-43 - J. W. P. Hirschfeld:

The Main Conjecture for MDS Codes. 44-52 - Graham H. Norton:

Some Decoding Applications of Minimal Realization. 53-62 - Pingzhi Z. Fan, Michael Darnell:

The Synthesis of Perfect Sequences. 63-73 - Walter T. Penzhorn, G. J. Kühn:

Computation of Low-Weight Parity Checks for Correlation Attacks on Stream Ciphers. 74-83 - Chris J. Mitchell

:
A Storage Complexity Based Analogue of Maurer Key Establishment Using Public Channels. 84-93 - Hai Pang Ho, Peter Sweeney:

Soft Decision Decoding of Reed Solomon Codes Using the Dorsch Algorithm. 94-99 - David J. C. MacKay:

Good Codes Based on Very Sparse Matrices. 100-111 - Simon J. D. Phoenix, Paul D. Townsend:

Quantum Cryptography: Protecting our Future Networks with Quantum Mechanics. 112-131 - Cristian Radu, René Govaerts, Joos Vandewalle:

Prepaid Electronic Cheques Using Public-Key Certificates. 132-141 - Stefan Lucks:

How Traveling Salespersons Prove Their Identity. 142-149 - Andrew Smith, Colin Boyd:

An Elliptic Curve Analogue of McCurley's Key Agreement Scheme. 150-157 - M. Ahmadian-Attari, Patrick Guy Farrell:

Multi-Dimensional Ring TCM Codes for Fading Channels. 158-168 - Henk C. A. van Tilborg:

Authentication Codes: an Area where Coding and Cryptology Meet. 169-183 - Nicolas Sendrier:

Efficient Generation of Binary Words of Given Weight. 184-187 - Richard G. E. Pinch:

Distribution of Recurrent Sequences Modulo Prime Powers. 188-189 - Christian Cachin:

On-Line Secret Sharing. 190-198 - Vladimir A. Oleshchuk:

Church-Rosser Codes. 199-204 - Anne Canteaut:

A New Algorithm for Finding Minimum-Weight Words in Large Linear Codes. 205-212 - E. V. Stansfield, Michael Walker:

Coding and Cryptography for Speech and Vision. 213-236 - Victor V. Zyablov, Sergo Shavgulidze

, Jørn Justesen:
Some Constructions of Generalised Concatenated Codes Based on Unit Memory Codes. 237-256 - Willi Geiselmann:

A Note on the Hash Function of Tillich and Zémor. 257-263 - Pascal Véron

:
Cryptanalysis of Harari's Identification Scheme. 264-269 - T. M. Quirke, Michael Darnell:

Analysis of Sequence Segment Keying as a Method of CDMA Transmission. 270-281 - Victor Buttigieg, Patrick Guy Farrell:

Constructions for Variable-Length Error-Correcting Codes. 282-291

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














