Cryptography and Coding: 9th IMA International Conference, Cirencester, UK, December 16-18, 2003. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The ninth in the series of IMA Conferences on Cryptography and Coding was held (as ever) at the Royal Agricultural College, Cirencester, from 16–18 Dec- ber 2003. The conference’s varied programme of 4 invited and 25 contributed papers is represented in this volume. The contributed papers were selected from the 49 submissions using a - reful refereeing process. The contributed and invited papers are grouped into 5 topics: coding and applications; applications of coding in cryptography; cryp- graphy; cryptanalysis; and network security and protocols. These topic headings represent the breadth of activity in the areas of coding, cryptography and c- munications, and the rich interplay between these areas. Assemblingtheconferenceprogrammeandthisproceedingsrequiredthehelp of many individuals. I would like to record my appreciation of them here. Firstly, I would like to thank the programme committee who aided me - mensely by evaluating the submissions, providing detailed written feedback for the authors of many of the papers, and advising me at many critical points - ring the process. Their help and cooperation was essential, especially in view of the short amount of time available to conduct the reviewing task. The c- mittee this year consisted of Mike Darnell, Mick Ganley, Bahram Honary, Chris Mitchell, Matthew Parker, Nigel Smart and Mike Walker.

Author(s): Patrick Guy Farrell (auth.), Kenneth G. Paterson (eds.)
Series: Lecture Notes in Computer Science 2898
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003

Language: English
Pages: 390
Tags: Data Encryption; Computer Science, general; Computer Communication Networks; Coding and Information Theory; Discrete Mathematics in Computer Science

Front Matter....Pages -
Recent Developments in Array Error-Control Codes....Pages 1-3
High Rate Convolutional Codes with Optimal Cycle Weights....Pages 4-23
A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes....Pages 24-34
Commitment Capacity of Discrete Memoryless Channels....Pages 35-51
Separating and Intersecting Properties of BCH and Kasami Codes....Pages 52-65
Analysis and Design of Modern Stream Ciphers....Pages 66-66
Improved Fast Correlation Attack Using Low Rate Codes....Pages 67-81
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions....Pages 82-92
Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class....Pages 93-114
Differential Uniformity for Arrays....Pages 115-124
Uses and Abuses of Cryptography....Pages 125-132
A Designer’s Guide to KEMs....Pages 133-151
A General Construction of IND-CCA2 Secure Public Key Encryption....Pages 152-166
Efficient Key Updating Signature Schemes Based on IBS....Pages 167-182
Periodic Sequences with Maximal Linear Complexity and Almost Maximal k -Error Linear Complexity....Pages 183-189
Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic....Pages 190-206
Resolving Large Prime(s) Variants for Discrete Logarithm Computation....Pages 207-222
Computing the M = UU t Integer Matrix Decomposition....Pages 223-233
Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups....Pages 234-244
More Detail for a Combined Timing and Power Attack against Implementations of RSA....Pages 245-263
Predicting the Inversive Generator....Pages 264-275
A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002....Pages 276-289
Analysis of Double Block Length Hash Functions....Pages 290-302
Cryptography in Wireless Standards....Pages 303-305
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms....Pages 306-318
A General Attack Model on Hash-Based Client Puzzles....Pages 319-331
Tripartite Authenticated Key Agreement Protocols from Pairings....Pages 332-359
Remote User Authentication Using Public Information....Pages 360-369
Mental Poker Revisited....Pages 370-383
Back Matter....Pages -