{"title":"A New Public-Key Cryptosystem Based on the Problem of Reconstructing p-Polynomials","authors":"C. Faure, P. Loidreau","doi":"10.1007/11779360_24","DOIUrl":"https://doi.org/10.1007/11779360_24","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructions of Complementary Sequences for Power-Controlled OFDM Transmission","authors":"K. Schmidt, A. Finger","doi":"10.1007/11779360_26","DOIUrl":"https://doi.org/10.1007/11779360_26","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128881417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes","authors":"V. Nikov, S. Nikova","doi":"10.1007/11779360_22","DOIUrl":"https://doi.org/10.1007/11779360_22","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130724074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Method for Constructing Almost Perfect Polyphase Sequences","authors":"Xiangyong Zeng, L. Hu, Qingchong Liu","doi":"10.1007/11779360_27","DOIUrl":"https://doi.org/10.1007/11779360_27","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"8 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131540102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Wagner-Magyarik Cryptosystem","authors":"F. Levy-dit-Vehel, Ludovic Perret","doi":"10.1007/11779360_25","DOIUrl":"https://doi.org/10.1007/11779360_25","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132707492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography","authors":"Takakazu Satoh","doi":"10.1007/11779360_13","DOIUrl":"https://doi.org/10.1007/11779360_13","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126144340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Error and Erasure Correction of Interleaved Reed-Solomon Codes","authors":"G. Schmidt, V. Sidorenko, M. Bossert","doi":"10.1007/11779360_3","DOIUrl":"https://doi.org/10.1007/11779360_3","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125051941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending Gibson's Attacks on the GPT Cryptosystem","authors":"Raphael Overbeck","doi":"10.1007/11779360_15","DOIUrl":"https://doi.org/10.1007/11779360_15","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133353644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency/Time Hopping Sequences with Large Linear Complexities","authors":"Yun-Pyo Hong, Hong‐Yeop Song","doi":"10.1007/11779360_30","DOIUrl":"https://doi.org/10.1007/11779360_30","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123546099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}