000 04538nam a22006255i 4500
001 978-3-540-46665-9
003 DE-He213
005 20240423132512.0
007 cr nn 008mamaa
008 121227s1999 gw | s |||| 0|eng d
020 _a9783540466659
_9978-3-540-46665-9
024 7 _a10.1007/3-540-46665-7
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aCryptography and Coding
_h[electronic resource] :
_b7th IMA International Conference, Cirencester, UK, December 20-22, 1999 Proceedings /
_cedited by Michael Walker.
250 _a1st ed. 1999.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c1999.
300 _aX, 352 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1746
505 0 _aApplications of Exponential Sums in Communications Theory -- Some Applications of Bounds for Designs to the Cryptography -- Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions -- Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics? -- A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System -- New Self-Dual Codes over GF(5) -- Designs, Intersecting Families, and Weight of Boolean Functions -- Coding Applications in Satellite Communication Systems [Invited Paper] -- A Unified Code -- Enhanced Image Coding for Noisy Channels -- Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System -- An Encoding Scheme for Dual Level Access to Broadcasting Networks -- Photograph Signatures for the Protection of Identification Documents -- An Overview of the Isoperimetric Method in Coding Theory (Extended Abstract) [Invited Paper] -- Rectangular Basis of a Linear Code -- Graph Decoding of Array Error-Correcting Codes -- Catastrophicity Test for Time-Varying Convolutional Encoders -- Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes -- On Efficient Decoding of Alternant Codes over a Commutative Ring? -- Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes -- Advanced Encryption Standard (AES) - An Update [Invited Paper] -- The Piling-Up Lemma and Dependent Random Variables -- A Cryptographic Application of Weil Descent -- Edit Probability Correlation Attack on the Bilateral Stop/Go Generator -- Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems (Extended Abstract) -- On the Combined Fermat/Lucas Probable Prime Test? -- On the Cryptanalysis of Nonlinear Sequences [InvitedPaper] -- Securing Aeronautical Telecommunications [Invited Paper] -- Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography (Extended Abstract) -- Delegated Decryption -- Fast and Space-Efficient Adaptive Arithmetic Coding? -- Robust Protocol for Generating Shared RSA Parameters -- Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes -- Weaknesses in Shared RSA Key Generation Protocols -- Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 0 _aInformation theory.
650 0 _aComputer science
_xMathematics.
650 0 _aDiscrete mathematics.
650 0 _aComputer networks .
650 1 4 _aCryptology.
650 2 4 _aCoding and Information Theory.
650 2 4 _aDiscrete Mathematics in Computer Science.
650 2 4 _aComputer Communication Networks.
700 1 _aWalker, Michael.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540668879
776 0 8 _iPrinted edition:
_z9783662188248
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1746
856 4 0 _uhttps://doi.org/10.1007/3-540-46665-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c188452
_d188452