HOME > 상세정보

상세정보

Cryptography and coding : 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 : proceedings

Cryptography and coding : 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 : proceedings

자료유형
단행본
개인저자
Walker, Michael, 1947-.
서명 / 저자사항
Cryptography and coding : 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 : proceedings / Michael Walker (ed.).
발행사항
Berlin ;   New York :   Springer,   c1999.  
형태사항
ix, 312 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1746
ISBN
354066887X (pbk. : alk. paper) 9783540668879 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Coding theory -- Congresses. Cryptography -- Congresses.
000 01418camuu2200361 a 4500
001 000045561479
005 20091125140101
008 991203s1999 gw a b 101 0 eng
010 ▼a 99088397
020 ▼a 354066887X (pbk. : alk. paper)
020 ▼a 9783540668879 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm43390288
035 ▼a (OCoLC)43390288
035 ▼a (KERIS)REF000005920590
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA268 ▼b .C76 2000
082 0 0 ▼a 003/.54 ▼2 21
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b I31c ▼c 7
111 2 ▼a IMA International Conference ▼n (7th : ▼d 1999 : ▼c Cirencester, England)
245 1 0 ▼a Cryptography and coding : ▼b 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 : proceedings / ▼c Michael Walker (ed.).
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1999.
300 ▼a ix, 312 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1746
504 ▼a Includes bibliographical references and index.
650 0 ▼a Coding theory ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Walker, Michael, ▼d 1947-.
830 0 ▼a Lecture notes in computer science ; ▼v 1746.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I31c 7 등록번호 121186720 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

저자소개

Michael Walker(엮은이)

정보제공 : Aladin

목차

Applications of Exponential Sums in Communications Theory.- Some Applications of Bounds for Designs to the Cryptography.- Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions.- Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics?.- A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System.- New Self-Dual Codes over GF(5).- Designs, Intersecting Families, and Weight of Boolean Functions.- Coding Applications in Satellite Communication Systems [Invited Paper].- A Unified Code.- Enhanced Image Coding for Noisy Channels.- Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System.- An Encoding Scheme for Dual Level Access to Broadcasting Networks.- Photograph Signatures for the Protection of Identification Documents.- An Overview of the Isoperimetric Method in Coding Theory (Extended Abstract) [Invited Paper].- Rectangular Basis of a Linear Code.- Graph Decoding of Array Error-Correcting Codes.- Catastrophicity Test for Time-Varying Convolutional Encoders.- Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes.- On Efficient Decoding of Alternant Codes over a Commutative Ring?.- Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes.- Advanced Encryption Standard (AES) - An Update [Invited Paper].- The Piling-Up Lemma and Dependent Random Variables.- A Cryptographic Application of Weil Descent.- Edit Probability Correlation Attack on the Bilateral Stop/Go Generator.- Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems (Extended Abstract).- On the Combined Fermat/Lucas Probable Prime Test?.- On the Cryptanalysis of Nonlinear Sequences [Invited Paper].- Securing Aeronautical Telecommunications [Invited Paper].- Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography (Extended Abstract).- Delegated Decryption.- Fast and Space-Efficient Adaptive Arithmetic Coding?.- Robust Protocol for Generating Shared RSA Parameters.- Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes.- Weaknesses in Shared RSA Key Generation Protocols.- Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.


정보제공 : Aladin

관련분야 신착자료