Cryptography and Coding: 7th IMA International Conference Cirencester, UK, December 20–22, 1999 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 7th IMA Conference on Cryptography and Coding held in Cirencester, UK, in December 1999.
The 35 revised full papers presented were carefully reviewed and selected for inclusion in the proceedings. Among the topics covered are error-correcting coding, arithmetic coding for data compression and encryption, image coding, biometric authentication, broadcast channel access, graph and trellis decoding, turbo codes, convolution codes, Reed Solomon codes, elliptic curve cryptography, primality testing, finite-field arithmetic, and cryptographic protocols.

Author(s): Kenneth G. Paterson (auth.), Michael Walker (eds.)
Series: Lecture Notes in Computer Science 1746
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1999

Language: English
Pages: 352
Tags: Data Encryption; Coding and Information Theory; Discrete Mathematics in Computer Science; Computer Communication Networks

Applications of Exponential Sums in Communications Theory....Pages 1-24
Some Applications of Bounds for Designs to the Cryptography....Pages 25-34
Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions....Pages 35-44
Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics⋆....Pages 45-55
A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System....Pages 56-62
New Self-Dual Codes over GF(5)....Pages 63-69
Designs, Intersecting Families, and Weight of Boolean Functions....Pages 70-80
Coding Applications in Satellite Communication Systems [Invited Paper]....Pages 81-83
A Unified Code....Pages 84-93
Enhanced Image Coding for Noisy Channels....Pages 94-103
Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System....Pages 104-113
An Encoding Scheme for Dual Level Access to Broadcasting Networks....Pages 114-118
Photograph Signatures for the Protection of Identification Documents....Pages 119-128
An Overview of the Isoperimetric Method in Coding Theory (Extended Abstract) [Invited Paper]....Pages 129-134
Rectangular Basis of a Linear Code....Pages 135-143
Graph Decoding of Array Error-Correcting Codes....Pages 144-152
Catastrophicity Test for Time-Varying Convolutional Encoders....Pages 153-162
Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes....Pages 163-172
On Efficient Decoding of Alternant Codes over a Commutative Ring⋆....Pages 173-178
Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes....Pages 179-184
Advanced Encryption Standard (AES) - An Update [Invited Paper]....Pages 185-185
The Piling-Up Lemma and Dependent Random Variables....Pages 186-190
A Cryptographic Application of Weil Descent....Pages 191-200
Edit Probability Correlation Attack on the Bilateral Stop/Go Generator....Pages 201-212
Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems (Extended Abstract)....Pages 213-221
On the Combined Fermat/Lucas Probable Prime Test⋆....Pages 222-235
On the Cryptanalysis of Nonlinear Sequences [Invited Paper]....Pages 236-242
Securing Aeronautical Telecommunications [Invited Paper]....Pages 243-243
Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography (Extended Abstract)....Pages 244-257
Delegated Decryption....Pages 258-269
Fast and Space-Efficient Adaptive Arithmetic Coding⋆....Pages 270-279
Robust Protocol for Generating Shared RSA Parameters....Pages 280-289
Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes....Pages 290-299
Weaknesses in Shared RSA Key Generation Protocols....Pages 300-306
Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison....Pages 307-312