Cryptography and Coding: Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings, Volume 5

Front Cover
This book constitutes the refereed proceedings of the 5th IMA Conference on Cryptography and Coding, held in Cirencester, UK in December 1995.
The volume presents 22 full revised papers selected from 48 submissions together with five invited full papers and three abstracts on the mathematical theory and practice of cryptography and coding; continuing advances in these strongly related areas are crucial for the security and reliability of data communication, processing, and storage. Among the topics addressed are linear codes, error-correcting codes, decoding, key distribution, authentication, hash functions, block ciphers, cryptanalysis, and electronic cash.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Design Choices and Security Implications in Implementing DiffleHellman Key Agreement
1
A Broadcast Key Distribution Scheme Based on Block Designs
2
Minimal Supports in Linear Codes
13
Sequential Decoding for a Subcode of Reed Solomon Codes
14
Linear Span Analysis of a Set of Periodic Sequence Generators
22
Minimal Weight kSR Representations
34
The Main Conjecture for MDS Codes
44
Some Decoding Applications of Minimal Realization
53
An Elliptic Curve Analogue of McCurleys Key Agreement Scheme
150
MultiDimensional Ring TCM Codes for Fading Channels
158
an Area where Coding and Cryptology Meet
169
Efficient Generation of Binary Words of Given Weight
184
Distribution of Recurrent Sequences Modulo Prime Powers Abstract
188
Online Secret Sharing
190
ChurchRosser Codes
199
A New Algorithm for Finding MinimumWeight Words in Large Linear Codes
205

The Synthesis of Perfect Sequences
63
Computation of LowWeight Parity Checks for Correlation Attacks on Stream Ciphers
74
A storage complexity based analogue of Maurer key establishment using public channels
84
Soft Decision Decoding of Reed Solomon Codes using the Dorsch Algorithm
94
Good Codes based on Very Sparse Matrices
100
Protecting our Future Networks with Quantum Mechanics
112
Prepaid Electronic Cheques Using PublicKey Certificates
132
How Traveling Salespersons Prove Their Identity
142
Coding and Cryptography for Speech and Vision
213
Some Constructions of Generalised Concatenated Codes Based on Unit Memory Codes
237
A Note on the Hash Function of Tillich and Zemor
257
Cryptanalysis of Hararis Identification Scheme
264
Analysis of Sequence Segment Keying as a Method of CDMA Transmission
270
Constructions for VariableLength ErrorCorrecting Codes
282
Copyright

Common terms and phrases