Cryptography and Coding 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
1999.
|
Έκδοση: | 1st ed. 1999. |
Σειρά: | Lecture Notes in Computer Science,
1746 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Applications of Exponential Sums in Communications Theory
- Some Applications of Bounds for Designs to the Cryptography
- Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions
- Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics?
- A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System
- New Self-Dual Codes over GF(5)
- Designs, Intersecting Families, and Weight of Boolean Functions
- Coding Applications in Satellite Communication Systems [Invited Paper]
- A Unified Code
- Enhanced Image Coding for Noisy Channels
- Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System
- An Encoding Scheme for Dual Level Access to Broadcasting Networks
- Photograph Signatures for the Protection of Identification Documents
- An Overview of the Isoperimetric Method in Coding Theory (Extended Abstract) [Invited Paper]
- Rectangular Basis of a Linear Code
- Graph Decoding of Array Error-Correcting Codes
- Catastrophicity Test for Time-Varying Convolutional Encoders
- Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes
- On Efficient Decoding of Alternant Codes over a Commutative Ring?
- Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes
- Advanced Encryption Standard (AES) - An Update [Invited Paper]
- The Piling-Up Lemma and Dependent Random Variables
- A Cryptographic Application of Weil Descent
- Edit Probability Correlation Attack on the Bilateral Stop/Go Generator
- Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems (Extended Abstract)
- On the Combined Fermat/Lucas Probable Prime Test?
- On the Cryptanalysis of Nonlinear Sequences [Invited Paper]
- Securing Aeronautical Telecommunications [Invited Paper]
- Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography (Extended Abstract)
- Delegated Decryption
- Fast and Space-Efficient Adaptive Arithmetic Coding?
- Robust Protocol for Generating Shared RSA Parameters
- Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes
- Weaknesses in Shared RSA Key Generation Protocols
- Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.