Cryptography and Coding: 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings
Springer Science & Business Media, Dec 3, 2003 - Computers - 383 pages
The ninth in the series of IMA Conferences on Cryptography and Coding was held (as ever) at the Royal Agricultural College, Cirencester, from 16–18 Dec- ber 2003. The conference’s varied programme of 4 invited and 25 contributed papers is represented in this volume. The contributed papers were selected from the 49 submissions using a - reful refereeing process. The contributed and invited papers are grouped into 5 topics: coding and applications; applications of coding in cryptography; cryp- graphy; cryptanalysis; and network security and protocols. These topic headings represent the breadth of activity in the areas of coding, cryptography and c- munications, and the rich interplay between these areas. Assemblingtheconferenceprogrammeandthisproceedingsrequiredthehelp of many individuals. I would like to record my appreciation of them here. Firstly, I would like to thank the programme committee who aided me - mensely by evaluating the submissions, providing detailed written feedback for the authors of many of the papers, and advising me at many critical points - ring the process. Their help and cooperation was essential, especially in view of the short amount of time available to conduct the reviewing task. The c- mittee this year consisted of Mike Darnell, Mick Ganley, Bahram Honary, Chris Mitchell, Matthew Parker, Nigel Smart and Mike Walker.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
1-partials adversary algorithm assume attack binary bits block cipher block length hash Boolean function ciphertext client puzzles codewords columns combined parity check complexity compression functions construction convolutional codes covering radius Cryptology cryptosystem cycle decoding decryption deﬁned denote digits discrete logarithm distribution encryption scheme equations factor base Field Sieve ﬁrst given identity-based IND-CCA2 input integer key derivation function key updates key-insulated signature scheme large primes lattice Lemma length hash functions linear LNCS method nonlinear obtain optimal output parameter parity check matrix player polynomial preimage attack private key probabilistic encryption probability problem proof protocol public key queries random numbers random oracle random oracle model random variables relations result S-box secret key Section sequence session key simulation Springer-Verlag stream ciphers Theorem trellis turbo turbo codes values vector verify