HOME > Detail View

Detail View

Cryptography and coding : 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 : proceedings

Cryptography and coding : 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 : proceedings

Material type
단행본
Personal Author
Walker, Michael, 1947-.
Title Statement
Cryptography and coding : 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 : proceedings / Michael Walker (ed.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c1999.  
Physical Medium
ix, 312 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 1746
ISBN
354066887X (pbk. : alk. paper) 9783540668879 (pbk. : alk. paper)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Coding theory -- Congresses. Cryptography -- Congresses.
000 01418camuu2200361 a 4500
001 000045561479
005 20091125140101
008 991203s1999 gw a b 101 0 eng
010 ▼a 99088397
020 ▼a 354066887X (pbk. : alk. paper)
020 ▼a 9783540668879 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm43390288
035 ▼a (OCoLC)43390288
035 ▼a (KERIS)REF000005920590
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA268 ▼b .C76 2000
082 0 0 ▼a 003/.54 ▼2 21
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b I31c ▼c 7
111 2 ▼a IMA International Conference ▼n (7th : ▼d 1999 : ▼c Cirencester, England)
245 1 0 ▼a Cryptography and coding : ▼b 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 : proceedings / ▼c Michael Walker (ed.).
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1999.
300 ▼a ix, 312 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1746
504 ▼a Includes bibliographical references and index.
650 0 ▼a Coding theory ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Walker, Michael, ▼d 1947-.
830 0 ▼a Lecture notes in computer science ; ▼v 1746.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 I31c 7 Accession No. 121186720 Availability Available Due Date Make a Reservation Service B M

Contents information

Author Introduction

Michael Walker(엮은이)

Information Provided By: : Aladin

Table of Contents

Applications of Exponential Sums in Communications Theory.- Some Applications of Bounds for Designs to the Cryptography.- Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions.- Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics?.- A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System.- New Self-Dual Codes over GF(5).- Designs, Intersecting Families, and Weight of Boolean Functions.- Coding Applications in Satellite Communication Systems [Invited Paper].- A Unified Code.- Enhanced Image Coding for Noisy Channels.- Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System.- An Encoding Scheme for Dual Level Access to Broadcasting Networks.- Photograph Signatures for the Protection of Identification Documents.- An Overview of the Isoperimetric Method in Coding Theory (Extended Abstract) [Invited Paper].- Rectangular Basis of a Linear Code.- Graph Decoding of Array Error-Correcting Codes.- Catastrophicity Test for Time-Varying Convolutional Encoders.- Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes.- On Efficient Decoding of Alternant Codes over a Commutative Ring?.- Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes.- Advanced Encryption Standard (AES) - An Update [Invited Paper].- The Piling-Up Lemma and Dependent Random Variables.- A Cryptographic Application of Weil Descent.- Edit Probability Correlation Attack on the Bilateral Stop/Go Generator.- Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems (Extended Abstract).- On the Combined Fermat/Lucas Probable Prime Test?.- On the Cryptanalysis of Nonlinear Sequences [Invited Paper].- Securing Aeronautical Telecommunications [Invited Paper].- Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography (Extended Abstract).- Delegated Decryption.- Fast and Space-Efficient Adaptive Arithmetic Coding?.- Robust Protocol for Generating Shared RSA Parameters.- Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes.- Weaknesses in Shared RSA Key Generation Protocols.- Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

이창현 (2021)