000 04517nam a22006735i 4500
001 978-3-642-01877-0
003 DE-He213
005 20240423125440.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 _a9783642018770
_9978-3-642-01877-0
024 7 _a10.1007/978-3-642-01877-0
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aCoding and Cryptology
_h[electronic resource] :
_bSecond International Workshop, IWCC 2009 /
_cedited by Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing.
250 _a1st ed. 2009.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2009.
300 _aVIII, 275 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5557
505 0 _aAn Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity -- Separation and Witnesses -- Binary Covering Arrays and Existentially Closed Graphs -- A Class of Three-Weight and Four-Weight Codes -- Equal-Weight Fingerprinting Codes -- Problems on Two-Dimensional Synchronization Patterns -- A New Client-to-Client Password-Authenticated Key Agreement Protocol -- Elliptic Twin Prime Conjecture -- Hunting for Curves with Many Points -- List Decoding of Binary Codes–A Brief Survey of Some Recent Results -- Recent Developments in Low-Density Parity-Check Codes -- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks -- On Weierstrass Semigroups of Some Triples on Norm-Trace Curves -- ERINDALE: A Polynomial Based Hashing Algorithm -- A Survey of Algebraic Unitary Codes -- New Family of Non-Cartesian Perfect Authentication Codes -- On the Impossibility of Strong Encryption Over -- Minimum Distance between Bent and Resilient Boolean Functions -- Unconditionally Secure Approximate Message Authentication -- Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences -- On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction.
520 _aThis book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009. The 21 revised full technical papers, except one, are contributed by the invited speakers of the workshop. The papers were carefully selected during two rounds of reviewing and improvement for inclusion in the volume and address all aspects of coding theory, cryptology and related areas - such as combinatorics - theoretical or applied. Topics addressed are coding theory, secure codes, hash functions, combinatorics, boolean functions, authentication, cryptography, protocols, sequences, and secure communications.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 0 _aInformation theory.
650 0 _aComputer science
_xMathematics.
650 0 _aDiscrete mathematics.
650 0 _aComputer networks .
650 1 4 _aCryptology.
650 2 4 _aCoding and Information Theory.
650 2 4 _aDiscrete Mathematics in Computer Science.
650 2 4 _aComputer Communication Networks.
700 1 _aChee, Yeow Meng.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLi, Chao.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLing, San.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWang, Huaxiong.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aXing, Chaoping.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642018138
776 0 8 _iPrinted edition:
_z9783642018794
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5557
856 4 0 _uhttps://doi.org/10.1007/978-3-642-01877-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c178054
_d178054