Abstract is missing.
- A Statistical Decoding Algorithm for General Linear Block CodesA. Kh. Al Jabri. 1-8 [doi]
- On the Undetected Error Probability for Shortened Hamming Codes on Channels with MemoryChristoph Lange, Andreas Ahrens. 9-19 [doi]
- The Complete Weight Enumerator for Codes over M::n×s::(F::q::)Irfan Siap. 20-26 [doi]
- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting ProblemMaki Yoshida, Toru Fujiwara. 27-37 [doi]
- A Simple Soft-Input/Soft-Output Decoder for Hamming CodesSimon Hirst, Bahram Honary. 38-43 [doi]
- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power AttacksManfred von Willich. 44-62 [doi]
- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIsKarl Brincat, Chris J. Mitchell. 63-72 [doi]
- The Exact Security of ECIES in the Generic Group ModelNigel P. Smart. 73-84 [doi]
- A New Ultrafast Stream Cipher Design: COS CiphersEric Filiol, Caroline Fontaine. 85-98 [doi]
- On Rabin-Type SignaturesMarc Joye, Jean-Jacques Quisquater. 99-113 [doi]
- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng. 114-127 [doi]
- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L StepsF. Javier Galán-Simón, Edgar Martínez-Moro, Juan Tena Ayuso. 128-137 [doi]
- Almost-Certainly Runlength-Limiting CodesDavid J. C. MacKay. 138-147 [doi]
- Weight vs. Magnetization Enumerator for Gallager CodesJort van Mourik, David Saad, Yoshiyuki Kabashima. 148-157 [doi]
- Graph Configurations and Decoding PerformanceJ. T. Paire, Paul Coulton, Patrick G. Farrell. 158-165 [doi]
- A Line Code Construction for the Adder Channel with Rates Higher than Time-SharingPhilip Benachour, Patrick G. Farrell, Bahram Honary. 166-175 [doi]
- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication SystemsAhmed Al-Dabbagh, Michael Darnell. 176-190 [doi]
- Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric SpacesSvetla Nikova, Ventzislav Nikov. 191-204 [doi]
- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random CodingShujun Li, Li Qi, Li Wenmin, Xuanqin Mou, Cai Yuanlong. 205-221 [doi]
- The Wide Trail Design StrategyJoan Daemen, Vincent Rijmen. 222-238 [doi]
- Undetachable Threshold SignaturesNiklas Borselius, Chris J. Mitchell, Aaron Wilson. 239-244 [doi]
- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction StrategiesWerner Schindler, François Koeune, Jean-Jacques Quisquater. 245-267 [doi]
- Key Recovery Scheme Interoperability - A Protocol for Mechanism NegotiationKonstantinos Rantos, Chris J. Mitchell. 268-276 [doi]
- Unconditionally Secure Key Agreement ProtocolCyril Prissette. 277-293 [doi]
- An Efficient Stream Cipher Alpha1 for Mobile and Wireless DevicesN. Komninos, Bahram Honary, Michael Darnell. 294-300 [doi]
- Investigation of Linear Codes Possessing Some Extra PropertiesViktoriya Masol. 301-306 [doi]
- Statistical Physics of Low Density Parity Check Error Correcting CodesDavid Saad, Yoshiyuki Kabashima, Tatsuto Murayama, Renato Vicente. 307-316 [doi]
- Generating Large Instances of the Gong-Harn CryptosystemKenneth J. Giuliani, Guang Gong. 317-328 [doi]
- Lattice Attacks on RSA-Encrypted IP and TCPPaul A. Crouch, James H. Davenport. 329-338 [doi]
- Spectrally Bounded Sequences, Codes, and States: Graph Constructions and EntanglementMatthew G. Parker. 339-354 [doi]
- Attacking the Affine Parts of SFLASHWilli Geiselmann, Rainer Steinwandt, Thomas Beth. 355-359 [doi]
- An Identity Based Encryption Scheme Based on Quadratic ResiduesClifford Cocks. 360-363 [doi]
- Another Way of Doing RSA Cryptography in HardwareLejla Batina, Geeke Muurling. 364-373 [doi]
- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random NumbersJulio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera. 374-377 [doi]
- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSASeyed J. Tabatabaian, Sam Ikeshiro, Murat Gumussoy, Mungal S. Dhanda. 378-386 [doi]
- A New Undeniable Signature Scheme Using Smart CardsLee Jongkook, Ryu Shiryong, Kim Jeungseop, Yoo Keeyoung. 387-394 [doi]
- Non-binary Block Inseparable Errors Control CodesAlexandr Y. Lev, Yuliy A. Lev, Vyacheslav N. Okhrymenko. 395-401 [doi]
- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi DecodingSabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor. 402-414 [doi]