{"entities":{"Q5952310":{"pageid":8129112,"ns":120,"title":"Item:Q5952310","lastrevid":31379557,"modified":"2024-03-19T17:42:30Z","type":"item","id":"Q5952310","labels":{"en":{"language":"en","value":"Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17--19, 2001. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 1688715"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5952310$264D35DE-2A5B-40F5-9ACA-D30F77F97AAE","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"59c676b7cf422ee9efe48f073d29c4cec1f77d81","datavalue":{"value":{"text":"Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17--19, 2001. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q5952310$01377E9D-4D49-465C-9AC8-B36342CB91BD","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"c86d3f78be1aff7a84160128c0ba9246cd7ef2e3","datavalue":{"value":"0977.00047","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952310$5126A752-5527-4778-93E0-B7D3700CFEEC","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"f82c9afcb94e6dd85c80896be888d490b6b7b91f","datavalue":{"value":"10.1007/3-540-45325-3","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952310$E6738286-CE3A-4AC8-9FF5-B984DB0E0CD7","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5952310$C8127067-1990-4CBB-A37D-4060F16139C6","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"d99679be6596c8cc4e11d1bbb5f9466f6a2a85c4","datavalue":{"value":{"time":"+2002-01-09T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q5952310$4D23517A-9105-4DC0-BC9A-0F804DF5F1CC","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"97ddd192670f783fa388e452ae231a51dc11d78c","datavalue":{"value":"The articles of this volume will be reviewed individually.  Indexed articles:  \\textit{Al Jabri, A.}, A statistical decoding algorithm for general linear block codes, 1-8 [Zbl 0999.94531]  \\textit{Lange, Christoph; Ahrens, Andreas}, On the undetected error probability for shortened Hamming codes on channels with memory, 9-19 [Zbl 0999.94572]  \\textit{Siap, Irfan}, The complete weight enumerator for codes over \\({\\mathcal M}_{n\\times s}(\\mathbb F_g)\\), 20-26 [Zbl 0999.94561]  \\textit{Yoshida, Maki; Fujiwara, Toru}, Further improvement of Kumar-Rajagopalan-Sahai coding constructions for blacklisting problem, 27-37 [Zbl 0999.94562]  \\textit{Hirst, Simon; Honary, Bahram}, A simple soft-input/soft-output decoder for Hamming codes, 38-43 [Zbl 0999.94566]  \\textit{von Willich, Manfred}, A technique with an information-theoretic basis for protecting secret data from differential power attacks, 44-62 [Zbl 0999.94537]  \\textit{Brincat, Karl; Mitchell, Chris J.}, Key recovery attacks on MACs based on properties of cryptographic APIs, 63-72 [Zbl 0999.94553]  \\textit{Smart, N. P.}, The exact security of ECIES in the generic group model, 73-84 [Zbl 1002.68806]  \\textit{Filiol, Eric; Fontaine, Caroline}, A new ultrafast stream cipher design: COS ciphers, 85-98 [Zbl 1001.68907]  \\textit{Joye, Marc; Quisquater, Jean-Jacques}, On Rabin-type signatures, 99-113 [Zbl 0998.94550]  \\textit{Kim, Seungjoo; Cheon, Jung Hee; Joye, Marc; Lim, Seongan; Mambo, Masahiro; Won, Dongho; Zheng, Yuliang}, Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation), 114-127 [Zbl 1024.68527]  \\textit{Gal\u00e1n-Sim\u00f3n, F. Javier; Martinez-Moro, Edgar; Tena-Ayuso, Juan G.}, Majority-logic-decodable cyclic arithmetic-modular AN codes in 1, 2, and \\(\\text{L}\\) steps, 128-137 [Zbl 0998.94557]  \\textit{MacKay, David J. C.}, Almost-certainly runlength-limiting codes, 138-147 [Zbl 0998.94525]  \\textit{van Mourik, Jort; Saad, David; Kabashima, Yoshiyuki}, Weight vs. magnetization enumerator for Gallager codes, 148-157 [Zbl 0998.94560]  \\textit{Paire, J. T.; Coulton, P.; Farrell, P. G.}, Graph configurations and decoding performance, 158-165 [Zbl 0998.94559]  \\textit{Benachour, P.; Farrell, P. G.; Honary, Bahram}, A line code construction for the adder channel with rates higher than time-sharing, 166-175 [Zbl 0998.94522]  \\textit{Al-Dabbagh, Ahmed; Darnell, Michael}, The synthesis of TD-sequences and their application to multi-functional communication systems, 176-190 [Zbl 0998.94505]  \\textit{Nikova, Svetla; Nikov, Ventzislav}, Improvement of the Delsarte bound for \\(\\tau\\)-designs in finite polynomial metric spaces, 191-204 [Zbl 1005.94542]  \\textit{Li, Shujun; Li, Qi; Li, Wenmin; Mou, Xuanqin; Cai, Yuanlong}, Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding, 205-221 [Zbl 0998.94543]  \\textit{Daemen, Joan; Rijmen, Vincent}, The wide trail design strategy, 222-238 [Zbl 0998.94541]  \\textit{Borselius, Niklas; Mitchell, Chris J.; Wilson, Aaron}, Undetachable threshold signatures, 239-244 [Zbl 0998.94548]  \\textit{Schindler, Werner; Koeune, Fran\u00e7ois; Quisquater, Jean-Jacques}, Improving divide and conquer attacks against cryptosystems by better error detection: correction strategies, 245-267 [Zbl 0998.94545]  \\textit{Rantos, Konstantinos; Mitchell, Chris J.}, Key recovery scheme interoperability -- a protocol for mechanism negotiation, 268-276 [Zbl 1002.68808]  \\textit{Prissette, Cyril}, Unconditionally secure key agreement protocol, 277-293 [Zbl 0998.94544]  \\textit{Komninos, N.; Honary, Bahram; Darnell, Michael}, An efficient stream cipher Alpha1 for mobile and wireless devices, 294-306 [Zbl 1002.68807]  \\textit{Masol, Viktoriya}, Investigation of linear codes possessing some extra properties, 301-306 [Zbl 0998.94564]  \\textit{Saad, David; Kabashima, Yoshiyuki; Murayama, Tatsuto; Vicente, Renato}, Statistical physics of low density parity check error correcting codes, 307-316 [Zbl 0998.94562]  \\textit{Giuliani, Kenneth J.; Gong, Guang}, Generating large instances of the Gong-Harn cryptosystem, 317-328 [Zbl 0998.94542]  \\textit{Crouch, P. A.; Davenport, J. H.}, Lattice attacks on RSA-encrypted IP and TCP, 329-338 [Zbl 1002.68809]  \\textit{Parker, Matthew G.}, Spectral bounded sequences, codes, and states: graph constructions and entanglement, 339-354 [Zbl 0999.94560]  \\textit{Geiselmann, Willi; Steinwandt, Rainer; Beth, Thomas}, Attacking the affine parts of SFLASH, 355-359 [Zbl 0999.94555]  \\textit{Cocks, Clifford}, An identity based encryption scheme based on quadratic residues, 360-363 [Zbl 0999.94532]  \\textit{Batina, Lejla; Muurling, Geeke}, Another way of doing RSA cryptography in hardware, 364-373 [Zbl 1002.68630]  \\textit{Hern\u00e1ndez, Julio C\u00e9sar; Sierra, Jos\u00e9 Mar\u00eda; Ribagorda, Arturo; Ramos, Benjamin; Mex-Perera, J. C.}, Distinguishing TEA from a random permutation: reduced round versions of TEA do not have the SAC or do not generate random numbers, 374-377 [Zbl 1002.68810]  \\textit{Tabatabaian, Seyed J.; Ikeshiro, Sam; Gumussoy, Murat; Dhanda, Mungal S.}, A new search pattern in multiple residue method (MRM) and its importance in the cryptanalysis of the RSA, 378-386 [Zbl 0999.94536]  \\textit{Lee, Jongkook; Ryu, Shiryong; Kim, Jeungseop; Yoo, Keeyoung}, A new undeniable signature scheme using smart cards, 387-394 [Zbl 0999.94556]  \\textit{Lev, Alexandr Y.; Lev, Yuliy A.; Okhrymenko, Vyacheslav N.}, Non-binary block inseparable errors control codes, 395-401 [Zbl 0999.94571]  \\textit{Leveiller, Sabine; Boutros, Joseph; Guillot, Philippe; Z\u00e9mor, Gilles}, Cryptanalysis of nonlinear filter generators with \\(\\{0,1\\}\\)-metric Viterbi decoding, 402-414 [Zbl 1004.94539]","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952310$4BA905C3-F61B-47B3-BB5E-33720550042A","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952310$64CA3D7D-7E95-4121-A9C3-1FCBE14C0565","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952310$0CDD9ED3-D96A-43F3-B2F8-2C6BE5C4CA02","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952310$F7C07090-4BCA-4D93-9B97-E0D30A451886","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"a85eb08ff5e78ad886787b23b18bdf9e7c510249","datavalue":{"value":"1688715","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952310$4042B340-EBD8-4035-B335-4B67DC791A5D","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"ba225240f555d0f7e23e007a8bc7a1b96eae6750","datavalue":{"value":"Cirencester (GB)","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952310$23A1CF3C-0DBF-4311-9B48-A1DF1AF6D42E","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952310$CCFD7FA1-22D7-4B4D-8334-4B31BCA0EB05","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952310$88BD00AA-7A9D-43E7-8530-38862B9B09E7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"dcc63dc027acbcc3cf7191352f56e5e8716a19f0","datavalue":{"value":"Cryptography","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952310$1CD3FCD4-9431-4250-B530-3ECB10E4226B","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"0355accaba83ad3e50998f5c08631796ce1af1dd","datavalue":{"value":"Coding","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952310$546C88DA-DA71-4263-B8ED-6C13DBC7457D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"997d21c9b3856fb0f7bb825f658adbd10b817ac0","datavalue":{"value":"IMA conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q5952310$AF97D9D4-8765-4CF0-9175-D68BAD85923E","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q5952310$6F0588B8-4DD7-4066-A2C1-9149B970B520","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"62612f6d7ef0c12809c2fc5447a409b73d36cad2","datavalue":{"value":"https://doi.org/10.1007/3-540-45325-3","type":"string"},"datatype":"url"},"type":"statement","id":"Q5952310$5D628E14-32CD-4EEF-9404-FD3DFAA0C855","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"ac4469974ed3481f10f67f9ea3be8fc4e504c75b","datavalue":{"value":"W2491864954","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q5952310$F62FBE1C-5B80-482F-918D-D6DF27699F4D","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Publication:5952310","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Publication:5952310"}}}}}