Abstract is missing.
- The Theory and Application of Reciprocal Pairs of Periodic SequencesAhmed Al-Dabbagh, Michael Darnell. 1-16
- Zero-Error Codes for Correlated Information SourcesA. Kh. Al Jabri, S. Al-Issa. 17-22
- Trellis Decoding Techniques and Their Performance in the Adder Channel for Synchronous and Asynchronous CCMA CodesPhilip Benachour, Garik Markarian, Bahram Honary. 23-29
- Key Agreement Protocols and Their Security AnalysisSimon Blake-Wilson, Don Johnson, Alfred Menezes. 30-45
- Low Density Parity Check Codes Based on Sparse Matrices with No Small CyclesJames W. Bond, Stefan Hui, Hank Schmidt. 46-58
- On the SAFER CryptosystemKarl Brincat, Alko Meijer. 59-68
- An Adaptive Approach to T of N User Multi-access Communications Channel Using an Orthogonal Coded MultiplexerK. L. Brown, Michael Darnell. 69-73
- The Breaking of the Lorenz Cipher: An Introduction to the Theory behind the Operational Role of "Colossus" at BPFrank L. Carter. 74-88
- Split Knowledge Generation of RSA ParametersClifford Cocks. 89-95
- Analysis of Error Contol in Digital Trunked Radio SystemsPingzhi Fan. 96-100
- Reconstruction of Convolutional Encoders over GF(q)Eric Filiol. 101-109
- HCC: A Hash Function Using Error Correcting CodesSami Harari. 110-117
- Public-Key Cryptosystems Based on Elliptic Curves - An Evolutionary ApproachErwin Hess. 118
- Novel Application of Turbo Decoding for Radio ChannelsBahram Honary, B. Thomas, Paul Coulton, Michael Darnell. 119-130
- Finding Small Roots of Univariate Modular Equations RevisitedNick Howgrave-Graham. 131-142
- Robust Reed Solomon Coded MPSK ModulationE. Husni, Peter Sweeney. 143-154
- RSA-type Signatures in the Presence of Transient FaultsMarc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng. 155-160
- A Digital Signature Scheme Based on Random Error-Correcting CodesGregory Kabatianskii, E. Krouk, Ben J. M. Smeets. 161-167
- Variable Rate Adaptive Trellis Coded QAM for High Bandwidth Efficiency Applications under Raleigh Fading ChannelVincent K. N. Lau, Malcolm D. Macleod. 168-179
- Variable Rate Adaptive Channel Coding for Coherent and Non-coherent Raleigh Fading ChannelVincent K. N. Lau, S. V. Maric. 180-191
- LABYRINTH: a New Ultra High Speed Stream CipherBo Lin, S. J. Shepherd. 192-198
- Resisting the Bergen-Hogan Attack on Adaptive Arithmetic CodingXian Liu, Patrick G. Farrell, Colin Boyd. 199-208
- Novel Decoding Technique for the Synchronous and Quasi-synchronous Multiple Access Adder ChannelGarik Markarian, Philip Benachour, Bahram Honary. 209-220
- Increasing Efficiency of International Key Escrow in Mutually Mistrusting DomainsKeith M. Martin. 221-232
- Multi Dimensional Compartment SchemesJohannes Maucher. 233-238
- Evaluation of Standard Approximation to Log-likelihood Ratio Addition in the MAP Algorithm, and its Application in Block Code (Turbo) Iterative Decoding AlgorithmsS. McManus, Patrick G. Farrell. 239-250
- Multiuser Coding Based on Detecting Matrices for Synchronous-CDMA SystemsWai Ho Mow. 251-257
- Enumeration of Convolutional Codes and Minimal EncodersConor O Donoghue, Cyril Burkley. 258-264
- On Using Carmichael Numbers for Public Key Encryption SystemsRichard G. E. Pinch. 265-269
- Hash Functions and MAC Algorithms Based on Block CiphersBart Preneel. 270-282
- Witness Hiding Restrictive Blind Signature SchemeCristian Radu, René Govaerts, Joos Vandewalle. 283-294
- A Note on the Construction and Upper Bounds of Correlation-Immune FunctionsMarkus Schneider II. 295-306
- On Generalised Concatenated CodesS. Sonander, Bahram Honary. 307-316
- Error Performance Analysis of Different Interleaving Strategies Applied to Eight Track Digital Tape SystemsA. Tandon, Patrick G. Farrell. 317-322
- Efficient Error-Propagating Block ChainingAndre Zuquete, Paulo Guedes. 323-334