HOME > 상세정보

상세정보

Cryptography and coding : 8th IMA International Conference, Cirencester, UK, December 17-19, 2001 : proceedings

Cryptography and coding : 8th IMA International Conference, Cirencester, UK, December 17-19, 2001 : proceedings

자료유형
단행본
개인저자
Honary, Bahram.
서명 / 저자사항
Cryptography and coding : 8th IMA International Conference, Cirencester, UK, December 17-19, 2001 : proceedings / Bahram Honary (ed.).
발행사항
Berlin ;   New York :   Springer,   c2001.  
형태사항
ix, 416 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 2260
ISBN
3540430261 (pbk. : alk. paper) 9783540430261 (pbk. : alk. paper)
일반주기
Also available via the World Wide Web.
서지주기
Includes bibliographical references.
이용가능한 다른형태자료
Also available via the World Wide Web.  
일반주제명
Coding theory -- Congresses. Cryptography -- Congresses.
000 01601camuu2200385 a 4500
001 000045561478
005 20091125140403
008 020501s2001 gw a b 101 0 eng c
010 ▼a 2002280620
015 ▼a GBA2-05139
020 ▼a 3540430261 (pbk. : alk. paper)
020 ▼a 9783540430261 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm48765509
035 ▼a (OCoLC)48765509
035 ▼a (KERIS)REF000006581587
040 ▼a ORU ▼c ORU ▼d C$Q ▼d UKM ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA268 ▼b .C76 2001
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b I31c ▼c 8
111 2 ▼a IMA International Conference ▼n (8th : ▼d 2001 : ▼c Cirencester, England)
245 1 0 ▼a Cryptography and coding : ▼b 8th IMA International Conference, Cirencester, UK, December 17-19, 2001 : proceedings / ▼c Bahram Honary (ed.).
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2001.
300 ▼a ix, 416 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2260
504 ▼a Includes bibliographical references.
530 ▼a Also available via the World Wide Web.
650 0 ▼a Coding theory ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Honary, Bahram.
830 0 ▼a Lecture notes in computer science ; ▼v 2260.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I31c 8 등록번호 121186721 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

A Statistical Decoding Algorithm for General Linear Block Codes.- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory.- The Complete Weight Enumerator for Codes over M nxs(F q).- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem.- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes.- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks.- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs.- The Exact Security of ECIES in the Generic Group Model.- A New Ultrafast Stream Cipher Design: COS Ciphers.- On Rabin-Type Signatures.- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps.- Almost-Certainly Runlength-Limiting Codes.- Weight vs. Magnetization Enumerator for Gallager Codes.- Graph Configurations and Decoding Performance.- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing.- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems.- Improvement of the Delsarte Bound for ?-Designs in Finite Polynomial Metric Spaces.- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding.- The Wide Trail Design Strategy.- Undetachable Threshold Signatures.- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies.- Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation.- Unconditionally Secure Key Agreement Protocol.- An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices.- Investigation of Linear Codes Possessing Some Extra Properties.- Statistical Physics of Low Density Parity Check Error Correcting Codes.- Generating Large Instances of the Gong-Harn Cryptosystem.- Lattice Attacks on RSA-Encrypted IP and TCP.- Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement.- Attacking the Affine Parts of SFLASH.- An Identity Based Encryption Scheme Based on Quadratic Residues.- Another Way of Doing RSA Cryptography in Hardware.- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA.- A New Undeniable Signature Scheme Using Smart Cards.- Non-binary Block Inseparable Errors Control Codes.- Cryptanalysis of Nonlinear Filter Generators with (0, 1)-Metric Viterbi Decoding.


정보제공 : Aladin

관련분야 신착자료