Invited Papers -- A Survey of Some Recent Results on Bent Functions -- A Survey of the Merit Factor Problem for Binary Sequences -- A Survey of Feedback with Carry Shift Registers -- Univariate and Multivariate Merit Factors -- Complexity of Sequences I -- Discrete Fourier Transform, Joint Linear Complexity and Generalized Joint Linear Complexity of Multisequences -- Expected Value of the Linea…
Inductive Inference -- Information -- Strict Minimum Message Length (SMML) -- Approximations to SMML -- MML: Quadratic Approximations to SMML -- MML Details in Some Interesting Cases -- Structural Models -- The Feathers on the Arrow of Time -- MML as a Descriptive Theory -- Related Work.The Minimum Message Length (MML) Principle is an information-theoretic approach to induction, hypothesis test…
Invited Talk I -- Trends and Challenges for Securer Cryptography in Practice -- Stream Ciphers Analysis -- Distinguishing Attacks on T-Functions -- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity -- Cryptography Based on Combinatorics -- Equivalent Keys in HFE, C*, and Variations -- A New Structural Attack for GPT and Variants -- A Family of F…
Invited Talk -- Abelian Varieties and Cryptography -- Sequences -- Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences -- Period of Streamcipher Edon80 -- Boolean Function and S-Box -- On the Algebraic Immunity of Symmetric Boolean Functions -- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way…
Invited Talks -- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model -- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations -- Applications -- On the Security of a Certified E-Mail S…
Solving the Nonlinear Schrödinger Equation -- Modulation and Detection Techniques for DWDW Systems -- Best Optical Filtering for Duobinary Transmission -- Theoretical Limits for the Dispersion Limited Optical Channel -- Capacity Bounds for Mimo Poisson Channels with Inter-symbol interference -- QSpace Project: Quantum Cryptography in Space -- Quantum-aided Classical Cryptography with a Moving …
Information Technology Security -- How can we justify trust in software based systems? -- The capacity of ciphers fulfilling the accessibility of cryptograms -- Parallelization of the Data Encryption Standard (DES) algorithm -- Linked authenticated dictionaries for certificate status verification -- Integrated Payment System for Public Key Infrastructure Services -- Some methods of the analysis…
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, provid…
Software Engineering Challenges -- Software Processes and Process Models -- Project Management -- Software Configuration Management -- Software Requirements Analysis and Specification -- Software Architecture and Design -- Project Planning -- Project Scheduling and Staffing -- Software Quality Management -- Rish Management -- Structured Design Methodology -- Object-Oriented Design and Design Me…
Invited Talks -- Probabilistic Validation of Computer System Survivability -- Timed Asynchronous Distributed Systems -- WLAN in Automation – More Than an Academic Exercise? -- Evaluation -- Using Stratified Sampling for Fault Injection -- A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code -- Quantitative Evaluation of D…