Coding and Applications |
Recent Developments in Array Error-Control Codes / Patrick Guy Farrell |
High Rate Convolutional Codes with Optimal Cycle Weights / Eirik Rosnes ; Øyvind Ytrehus |
A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes / Lina Fagoonee ; Bahram Honary |
Commitment Capacity of Discrete Memoryless Channels / Andreas Winter ; Anderson C.A. Nascimento ; Hideki Imai |
Separating and Intersecting Properties of BCH and Kasami Codes / Hans Georg Schaathun ; Tor Helleseth |
Applications of Coding in Cryptography |
Analysis and Design of Modern Stream Ciphers / Thomas Johansson |
Improved Fast Correlation Attack Using Low Rate Codes / Havard Molland ; John Erik Mathiassen |
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions / Yuri Borissov ; An Braeken ; Svetla Nikova ; Bart Preneel |
Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class / Enes Pasalic |
Differential Uniformity for Arrays / K.J. Horadam |
Cryptography |
Uses and Abuses of Cryptography / Richard Walton |
A Designer's Guide to KEMs / Alexander W. Dent |
A General Construction of IND-CCA2 Secure Public Key Encryption / Eike Kiltz ; John Malone-Lee |
Efficient Key Updating Signature Schemes Based on IBS / Dae Hyun Yum ; Pil Joong Lee |
Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity / Harald Niederreiter ; Igor E. Shparlinski |
Cryptanalysis |
Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic / Robert Granger |
Resolving Large Prime(s) Variants for Discrete Logarithm Computation / A.J. Holt ; J.H. Davenport |
Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups / Katharina Geißler ; Nigel P. Smart ; George Petrides |
More Detail for a Combined Timing and Power Attack against Implementations of RSA / Werner Schindler ; Colin D. Walter |
Predicting the Inversive Generator / Simon R. Blackburn ; Domingo Gomez-Perez ; Jaime Gutierrez |
A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002 |
Analysis of Double Block Length Hash Functions / Mitsuhiro Hattori ; Shoichi Hirose ; Susumu Yoshida |
Network Security and Protocols |
Cryptography in Wireless Standards (Invited Paper) / Valtteri Niemi |
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms / Tetsu Iwata ; Kaoru Kurosawa |
A General Attack Model on Hash-Based Client Puzzles / Geraint Price |
Tripartite Authenticated Key Agreement Protocols from Pairings / Sattam S. Al-Riyami ; Kenneth G. Paterson |
Remote User Authentication Using Public Information / Chris J. Mitchell |
Mental Poker Revisited / Adam Barnett |
Author Index |
Coding and Applications |
Recent Developments in Array Error-Control Codes / Patrick Guy Farrell |
High Rate Convolutional Codes with Optimal Cycle Weights / Eirik Rosnes ; Øyvind Ytrehus |
A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes / Lina Fagoonee ; Bahram Honary |
Commitment Capacity of Discrete Memoryless Channels / Andreas Winter ; Anderson C.A. Nascimento ; Hideki Imai |
Separating and Intersecting Properties of BCH and Kasami Codes / Hans Georg Schaathun ; Tor Helleseth |