Abstract is missing.
- Design Choices and Security Implications in Implementing Diffie-Hellman Key AgreementPaul C. van Oorschot. 1
- A Broadcast Key Distribution Scheme Based on Block DesignsValeri Korjik, Michael Ivkov, Yuri Merinovich, Alexander Barg, Henk C. A. van Tilborg. 2-12
- Minimal Supports in Linear CodesAlexei E. Ashikhmin, Alexander Barg. 13
- Sequential Decoding for a Subcode of Reed Solomon CodesSooyoung Kim Shin, Peter Sweeney. 14-21
- Linear Span Analysis of a Set of Periodic Sequence GeneratorsPino Caballero-Gil, Amparo Fúster-Sabater. 22-33
- Minimal Weight k-SR RepresentationsYongfei Han, Dieter Gollmann, Chris J. Mitchell. 34-43
- The Main Conjecture for MDS CodesJ. W. P. Hirschfeld. 44-52
- Some Decoding Applications of Minimal RealizationGraham H. Norton. 53-62
- The Synthesis of Perfect SequencesPingzhi Z. Fan, Michael Darnell. 63-73
- Computation of Low-Weight Parity Checks for Correlation Attacks on Stream CiphersWalter T. Penzhorn, G. J. Kühn. 74-83
- A Storage Complexity Based Analogue of Maurer Key Establishment Using Public ChannelsChris J. Mitchell. 84-93
- Soft Decision Decoding of Reed Solomon Codes Using the Dorsch AlgorithmH. P. Ho, Peter Sweeney. 94-99
- Good Codes Based on Very Sparse MatricesDavid J. C. MacKay. 100-111
- Quantum Cryptography: Protecting our Future Networks with Quantum MechanicsSimon J. D. Phoenix, Paul D. Townsend. 112-131
- Prepaid Electronic Cheques Using Public-Key CertificatesCristian Radu, René Govaerts, Joos Vandewalle. 132-141
- How Traveling Salespersons Prove Their IdentityStefan Lucks. 142-149
- An Elliptic Curve Analogue of McCurley s Key Agreement SchemeAndrew Smith, Colin Boyd. 150-157
- Multi-Dimensional Ring TCM Codes for Fading ChannelsM. Ahmadian-Attari, Patrick G. Farrell. 158-168
- Authentication Codes: an Area where Coding and Cryptology MeetHenk C. A. van Tilborg. 169-183
- Efficient Generation of Binary Words of Given WeightNicolas Sendrier. 184-187
- Distribution of Recurrent Sequences Modulo Prime PowersRichard G. E. Pinch. 188-189
- On-Line Secret SharingChristian Cachin. 190-198
- Church-Rosser CodesVladimir A. Oleshchuk. 199-204
- A New Algorithm for Finding Minimum-Weight Words in Large Linear CodesAnne Canteaut. 205-212
- Coding and Cryptography for Speech and VisionE. V. Stansfield, Michael Walker. 213-236
- Some Constructions of Generalised Concatenated Codes Based on Unit Memory CodesVictor V. Zyablov, Sergo Shavgulidze, Jørn Justesen. 237-256
- A Note on the Hash Function of Tillich and ZémorWilli Geiselmann. 257-263
- Cryptanalysis of Harari s Identification SchemePascal Véron. 264-269
- Analysis of Sequence Segment Keying as a Method of CDMA TransmissionT. M. Quirke, Michael Darnell. 270-281
- Constructions for Variable-Length Error-Correcting CodesVictor Buttigieg, Patrick G. Farrell. 282-291