Abstract is missing.
- Recent Developments in Array Error-Control Codes: (Invited Paper)Patrick Guy Farrell. 1-3 [doi]
- High Rate Convolutional Codes with Optimal Cycle WeightsEirik Rosnes, Øyvind Ytrehus. 4-23 [doi]
- A Multifunctional Turbo-Based Receiver Using Partial Unit Memory CodesLina Fagoonee, Bahram Honary. 24-34 [doi]
- Commitment Capacity of Discrete Memoryless ChannelsAndreas Winter, Anderson C. A. Nascimento, Hideki Imai. 35-51 [doi]
- Separating and Intersecting Properties of BCH and Kasami CodesHans Georg Schaathun, Tor Helleseth. 52-65 [doi]
- Analysis and Design of Modern Stream Ciphers: (Invited Paper) pThomas Johansson. 66 [doi]
- Improved Fast Correlation Attack Using Low Rate CodesHåvard Molland, John Erik Mathiassen, Tor Helleseth. 67-81 [doi]
- On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean FunctionsYuri L. Borissov, An Braeken, Svetla Nikova, Bart Preneel. 82-92 [doi]
- Degree Optimized Resilient Boolean Functions from Maiorana-McFarland ClassEnes Pasalic. 93-114 [doi]
- Differential Uniformity for ArraysKathy J. Horadam. 115-124 [doi]
- Uses and Abuses of Cryptography (Invited Paper)Richard Walton. 125-132 [doi]
- A Designer s Guide to KEMsAlexander W. Dent. 133-151 [doi]
- A General Construction of IND-CCA2 Secure Public Key EncryptionEike Kiltz, John Malone-Lee. 152-166 [doi]
- Efficient Key Updating Signature Schemes Based on IBSDae Hyun Yum, Pil Joong Lee. 167-182 [doi]
- Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear ComplexityHarald Niederreiter, Igor Shparlinski. 183-189 [doi]
- Estimates for Discrete Logarithm Computations in Finite Fields of Small CharacteristicRobert Granger. 190-206 [doi]
- Resolving Large Prime(s) Variants for Discrete Logarithm ComputationAndrew J. Holt, James H. Davenport. 207-222 [doi]
- Computing the M = U U:::t::: Integer Matrix DecompositionKatharina Geißler, Nigel P. Smart. 223-233 [doi]
- Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk GroupsGeorge Petrides. 234-244 [doi]
- More Detail for a Combined Timing and Power Attack against Implementations of RSAWerner Schindler, Colin D. Walter. 245-263 [doi]
- Predicting the Inversive GeneratorSimon R. Blackburn, Domingo Gomez-Perez, Jaime Gutierrez, Igor Shparlinski. 264-275 [doi]
- A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002Werner Schindler. 276-289 [doi]
- Analysis of Double Block Length Hash FunctionsMitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida. 290-302 [doi]
- Cryptography in Wireless Standards: (Invited Paper)Valtteri Niemi. 303-305 [doi]
- On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity AlgorithmsTetsu Iwata, Kaoru Kurosawa. 306-318 [doi]
- A General Attack Model on Hash-Based Client PuzzlesGeraint Price. 319-331 [doi]
- Tripartite Authenticated Key Agreement Protocols from PairingsSattam S. Al-Riyami, Kenneth G. Paterson. 332-359 [doi]
- Remote User Authentication Using Public InformationChris J. Mitchell. 360-369 [doi]
- Mental Poker RevisitedAdam Barnett, Nigel P. Smart. 370-383 [doi]