Coding and Cryptography (eBook, PDF)
International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected Papers
Redaktion: Ytrehus, Øyvind
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Coding and Cryptography (eBook, PDF)
International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected Papers
Redaktion: Ytrehus, Øyvind
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005. The 33 revised full papers were carefully reviewed and selected during two rounds of review. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 5.29MB
Andere Kunden interessierten sich auch für
- Coding and Cryptology (eBook, PDF)40,95 €
- Cryptography and Coding (eBook, PDF)40,95 €
- Cryptography and Coding (eBook, PDF)40,95 €
- Coding Theory, Cryptography and Related Areas (eBook, PDF)73,95 €
- Darrel HankersonGuide to Elliptic Curve Cryptography (eBook, PDF)97,95 €
- Progress in Cryptology - INDOCRYPT 2008 (eBook, PDF)40,95 €
- Progress in Cryptology - VIETCRYPT 2006 (eBook, PDF)40,95 €
-
-
-
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005. The 33 revised full papers were carefully reviewed and selected during two rounds of review. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 444
- Erscheinungstermin: 17. November 2006
- Englisch
- ISBN-13: 9783540354826
- Artikelnr.: 44228840
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 444
- Erscheinungstermin: 17. November 2006
- Englisch
- ISBN-13: 9783540354826
- Artikelnr.: 44228840
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Second Support Weights for Binary Self-dual Codes.- On Codes Correcting Symmetric Rank Errors.- Error and Erasure Correction of Interleaved Reed-Solomon Codes.- A Welch-Berlekamp Like Algorithm for Decoding Gabidulin Codes.- On the Weights of Binary Irreducible Cyclic Codes.- 3-Designs from Z 4-Goethals-Like Codes and Variants of Cyclotomic Polynomials.- Space-Time Code Designs Based on the Generalized Binary Rank Criterion with Applications to Cooperative Diversity.- Geometric Conditions for the Extendability of Ternary Linear Codes.- On the Design of Codes for DNA Computing.- Open Problems Related to Algebraic Attacks on Stream Ciphers.- On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two.- Interpolation of Functions Related to the Integer Factoring Problem.- On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography.- Finding Good Differential Patterns for Attacks on SHA-1.- Extending Gibson's Attacks on the GPT Cryptosystem.- Reduction of Conjugacy Problem in Braid Groups, Using Two Garside Structures.- A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy.- Multi-Dimensional Hash Chains and Application to Micropayment Schemes.- On the Affine Transformations of HFE-Cryptosystems and Systems with Branches.- Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems.- RSA-Based Secret Handshakes.- On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes.- ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps.- A New Public-Key Cryptosystem Based on the Problem of Reconstructing p-Polynomials.- On the Wagner-Magyarik Cryptosystem.- Constructions ofComplementary Sequences for Power-Controlled OFDM Transmission.- A Novel Method for Constructing Almost Perfect Polyphase Sequences.- Linear Filtering of Nonlinear Shift-Register Sequences.- Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation.- Frequency/Time Hopping Sequences with Large Linear Complexities.- One and Two-Variable Interlace Polynomials: A Spectral Interpretation.- Improved Bounds on Weil Sums over Galois Rings and Homogeneous Weights.- Locally Invertible Multivariate Polynomial Matrices.
Second Support Weights for Binary Self-dual Codes.- On Codes Correcting Symmetric Rank Errors.- Error and Erasure Correction of Interleaved Reed-Solomon Codes.- A Welch-Berlekamp Like Algorithm for Decoding Gabidulin Codes.- On the Weights of Binary Irreducible Cyclic Codes.- 3-Designs from Z 4-Goethals-Like Codes and Variants of Cyclotomic Polynomials.- Space-Time Code Designs Based on the Generalized Binary Rank Criterion with Applications to Cooperative Diversity.- Geometric Conditions for the Extendability of Ternary Linear Codes.- On the Design of Codes for DNA Computing.- Open Problems Related to Algebraic Attacks on Stream Ciphers.- On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two.- Interpolation of Functions Related to the Integer Factoring Problem.- On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography.- Finding Good Differential Patterns for Attacks on SHA-1.- Extending Gibson's Attacks on the GPT Cryptosystem.- Reduction of Conjugacy Problem in Braid Groups, Using Two Garside Structures.- A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy.- Multi-Dimensional Hash Chains and Application to Micropayment Schemes.- On the Affine Transformations of HFE-Cryptosystems and Systems with Branches.- Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems.- RSA-Based Secret Handshakes.- On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes.- ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps.- A New Public-Key Cryptosystem Based on the Problem of Reconstructing p-Polynomials.- On the Wagner-Magyarik Cryptosystem.- Constructions ofComplementary Sequences for Power-Controlled OFDM Transmission.- A Novel Method for Constructing Almost Perfect Polyphase Sequences.- Linear Filtering of Nonlinear Shift-Register Sequences.- Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation.- Frequency/Time Hopping Sequences with Large Linear Complexities.- One and Two-Variable Interlace Polynomials: A Spectral Interpretation.- Improved Bounds on Weil Sums over Galois Rings and Homogeneous Weights.- Locally Invertible Multivariate Polynomial Matrices.