Search dblp for Publications

export results for "toc:db/conf/ima/ima2003.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ima/Al-RiyamiP03,
  author       = {Sattam S. Al{-}Riyami and
                  Kenneth G. Paterson},
  editor       = {Kenneth G. Paterson},
  title        = {Tripartite Authenticated Key Agreement Protocols from Pairings},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {332--359},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_27},
  doi          = {10.1007/978-3-540-40974-8\_27},
  timestamp    = {Wed, 18 Mar 2020 16:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Al-RiyamiP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BarnettS03,
  author       = {Adam Barnett and
                  Nigel P. Smart},
  editor       = {Kenneth G. Paterson},
  title        = {Mental Poker Revisited},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {370--383},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_29},
  doi          = {10.1007/978-3-540-40974-8\_29},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BarnettS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BlackburnGGS03,
  author       = {Simon R. Blackburn and
                  Domingo G{\'{o}}mez{-}P{\'{e}}rez and
                  Jaime Gutierrez and
                  Igor E. Shparlinski},
  editor       = {Kenneth G. Paterson},
  title        = {Predicting the Inversive Generator},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {264--275},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_21},
  doi          = {10.1007/978-3-540-40974-8\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/BlackburnGGS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BorissovBNP03,
  author       = {Yuri L. Borissov and
                  An Braeken and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Kenneth G. Paterson},
  title        = {On the Covering Radius of Second Order Binary Reed-Muller Code in
                  the Set of Resilient Boolean Functions},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {82--92},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_8},
  doi          = {10.1007/978-3-540-40974-8\_8},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BorissovBNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Dent03,
  author       = {Alexander W. Dent},
  editor       = {Kenneth G. Paterson},
  title        = {A Designer's Guide to KEMs},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {133--151},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_12},
  doi          = {10.1007/978-3-540-40974-8\_12},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Dent03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/FagooneeH03,
  author       = {Lina Fagoonee and
                  Bahram Honary},
  editor       = {Kenneth G. Paterson},
  title        = {A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {24--34},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_3},
  doi          = {10.1007/978-3-540-40974-8\_3},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/FagooneeH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Farrell03,
  author       = {Patrick Guy Farrell},
  editor       = {Kenneth G. Paterson},
  title        = {Recent Developments in Array Error-Control Codes: (Invited Paper)},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_1},
  doi          = {10.1007/978-3-540-40974-8\_1},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Farrell03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GeisslerS03,
  author       = {Katharina Gei{\ss}ler and
                  Nigel P. Smart},
  editor       = {Kenneth G. Paterson},
  title        = {Computing the {M} = {U} U\({}^{\mbox{t}}\) Integer Matrix Decomposition},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {223--233},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_18},
  doi          = {10.1007/978-3-540-40974-8\_18},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/GeisslerS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Granger03,
  author       = {Robert Granger},
  editor       = {Kenneth G. Paterson},
  title        = {Estimates for Discrete Logarithm Computations in Finite Fields of
                  Small Characteristic},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {190--206},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_16},
  doi          = {10.1007/978-3-540-40974-8\_16},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Granger03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/HattoriHY03,
  author       = {Mitsuhiro Hattori and
                  Shoichi Hirose and
                  Susumu Yoshida},
  editor       = {Kenneth G. Paterson},
  title        = {Analysis of Double Block Length Hash Functions},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {290--302},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_23},
  doi          = {10.1007/978-3-540-40974-8\_23},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/HattoriHY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/HoltD03,
  author       = {Andrew J. Holt and
                  James H. Davenport},
  editor       = {Kenneth G. Paterson},
  title        = {Resolving Large Prime(s) Variants for Discrete Logarithm Computation},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_17},
  doi          = {10.1007/978-3-540-40974-8\_17},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/HoltD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Horadam03,
  author       = {Kathy J. Horadam},
  editor       = {Kenneth G. Paterson},
  title        = {Differential Uniformity for Arrays},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {115--124},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_10},
  doi          = {10.1007/978-3-540-40974-8\_10},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Horadam03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/IwataK03,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Kenneth G. Paterson},
  title        = {On the Correctness of Security Proofs for the 3GPP Confidentiality
                  and Integrity Algorithms},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {306--318},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_25},
  doi          = {10.1007/978-3-540-40974-8\_25},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/IwataK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Johansson03,
  author       = {Thomas Johansson},
  editor       = {Kenneth G. Paterson},
  title        = {Analysis and Design of Modern Stream Ciphers: (Invited Paper) p},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {66},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_6},
  doi          = {10.1007/978-3-540-40974-8\_6},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Johansson03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KiltzM03,
  author       = {Eike Kiltz and
                  John Malone{-}Lee},
  editor       = {Kenneth G. Paterson},
  title        = {A General Construction of {IND-CCA2} Secure Public Key Encryption},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {152--166},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_13},
  doi          = {10.1007/978-3-540-40974-8\_13},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KiltzM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Mitchell03,
  author       = {Chris J. Mitchell},
  editor       = {Kenneth G. Paterson},
  title        = {Remote User Authentication Using Public Information},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {360--369},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_28},
  doi          = {10.1007/978-3-540-40974-8\_28},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Mitchell03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MollandMH03,
  author       = {H{\aa}vard Molland and
                  John Erik Mathiassen and
                  Tor Helleseth},
  editor       = {Kenneth G. Paterson},
  title        = {Improved Fast Correlation Attack Using Low Rate Codes},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {67--81},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_7},
  doi          = {10.1007/978-3-540-40974-8\_7},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/MollandMH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/NiederreiterS03,
  author       = {Harald Niederreiter and
                  Igor E. Shparlinski},
  editor       = {Kenneth G. Paterson},
  title        = {Periodic Sequences with Maximal Linear Complexity and Almost Maximal
                  k-Error Linear Complexity},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {183--189},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_15},
  doi          = {10.1007/978-3-540-40974-8\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/NiederreiterS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Niemi03,
  author       = {Valtteri Niemi},
  editor       = {Kenneth G. Paterson},
  title        = {Cryptography in Wireless Standards: (Invited Paper)},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {303--305},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_24},
  doi          = {10.1007/978-3-540-40974-8\_24},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Niemi03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Pasalic03,
  author       = {Enes Pasalic},
  editor       = {Kenneth G. Paterson},
  title        = {Degree Optimized Resilient Boolean Functions from Maiorana-McFarland
                  Class},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {93--114},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_9},
  doi          = {10.1007/978-3-540-40974-8\_9},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Pasalic03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Petrides03,
  author       = {George Petrides},
  editor       = {Kenneth G. Paterson},
  title        = {Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem
                  on the Grigorchuk Groups},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {234--244},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_19},
  doi          = {10.1007/978-3-540-40974-8\_19},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Petrides03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Price03,
  author       = {Geraint Price},
  editor       = {Kenneth G. Paterson},
  title        = {A General Attack Model on Hash-Based Client Puzzles},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {319--331},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_26},
  doi          = {10.1007/978-3-540-40974-8\_26},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Price03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/RosnesY03,
  author       = {Eirik Rosnes and
                  {\O}yvind Ytrehus},
  editor       = {Kenneth G. Paterson},
  title        = {High Rate Convolutional Codes with Optimal Cycle Weights},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {4--23},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_2},
  doi          = {10.1007/978-3-540-40974-8\_2},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/RosnesY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SchaathunH03,
  author       = {Hans Georg Schaathun and
                  Tor Helleseth},
  editor       = {Kenneth G. Paterson},
  title        = {Separating and Intersecting Properties of {BCH} and Kasami Codes},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {52--65},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_5},
  doi          = {10.1007/978-3-540-40974-8\_5},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SchaathunH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Schindler03,
  author       = {Werner Schindler},
  editor       = {Kenneth G. Paterson},
  title        = {A Stochastical Model and Its Analysis for a Physical Random Number
                  Generator Presented At {CHES} 2002},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {276--289},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_22},
  doi          = {10.1007/978-3-540-40974-8\_22},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Schindler03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SchindlerW03,
  author       = {Werner Schindler and
                  Colin D. Walter},
  editor       = {Kenneth G. Paterson},
  title        = {More Detail for a Combined Timing and Power Attack against Implementations
                  of {RSA}},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {245--263},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_20},
  doi          = {10.1007/978-3-540-40974-8\_20},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SchindlerW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Walton03,
  author       = {Richard Walton},
  editor       = {Kenneth G. Paterson},
  title        = {Uses and Abuses of Cryptography (Invited Paper)},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {125--132},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_11},
  doi          = {10.1007/978-3-540-40974-8\_11},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Walton03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/WinterNI03,
  author       = {Andreas J. Winter and
                  Anderson C. A. Nascimento and
                  Hideki Imai},
  editor       = {Kenneth G. Paterson},
  title        = {Commitment Capacity of Discrete Memoryless Channels},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {35--51},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_4},
  doi          = {10.1007/978-3-540-40974-8\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/WinterNI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/YumL03,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Kenneth G. Paterson},
  title        = {Efficient Key Updating Signature Schemes Based on {IBS}},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {167--182},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_14},
  doi          = {10.1007/978-3-540-40974-8\_14},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/YumL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/2003,
  editor       = {Kenneth G. Paterson},
  title        = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b93924},
  doi          = {10.1007/B93924},
  isbn         = {3-540-20663-9},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics