HOME > 상세정보

상세정보

Cryptography and coding : 5th IMA International Conference, Cirencester, UK, December 18-20, 1995 : proceedings

Cryptography and coding : 5th IMA International Conference, Cirencester, UK, December 18-20, 1995 : proceedings

자료유형
단행본
개인저자
Boyd, Colin.
서명 / 저자사항
Cryptography and coding : 5th IMA International Conference, Cirencester, UK, December 18-20, 1995 : proceedings / Colin Boyd, ed.
발행사항
Berlin ;   New York :   Springer,   c1995.  
형태사항
ix, 291 p. : ill ; 24 cm.
총서사항
Lecture notes in computer science ;1025
ISBN
3540606939 (pbk. : alk. paper) 9783540606932 (pbk. : alk. paper)
서지주기
Includes bibliographical references.
일반주제명
Coding theory -- Congresses. Cryptography -- Congresses.
000 01353camuu2200349 a 4500
001 000045561541
005 20091125152608
008 951109s1995 nyua b 100 0 eng
010 ▼a 95047128
020 ▼a 3540606939 (pbk. : alk. paper)
020 ▼a 9783540606932 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm33820176
035 ▼a (OCoLC)33820176
035 ▼a (KERIS)REF000014124685
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a QA268 ▼b .C76 1995
082 0 0 ▼a 003/.54 ▼2 20
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b I31c ▼c 5
111 2 ▼a IMA International Conference ▼n (5th : ▼d 1995 : ▼c Cirencester, England)
245 1 0 ▼a Cryptography and coding : ▼b 5th IMA International Conference, Cirencester, UK, December 18-20, 1995 : proceedings / ▼c Colin Boyd, ed.
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1995.
300 ▼a ix, 291 p. : ▼b ill ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science ; ▼v 1025
504 ▼a Includes bibliographical references.
650 0 ▼a Coding theory ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Boyd, Colin.
830 0 ▼a Lecture notes in computer science ; ▼v 1025.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I31c 5 등록번호 121186503 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Design choices and security implications in implementing Diffie-Hellman key agreement.- A broadcast key distribution scheme based on block designs.- Minimal supports in linear codes.- Sequential decoding for a subcode of Reed Solomon Codes.- Linear Span analysis of a set of periodic sequence generators.- Minimal weight k-SR representations.- The main conjecture for MDS codes.- Some decoding applications of minimal realization.- The synthesis of perfect sequences.- Computation of low-weight parity checks for correlation attacks on stream ciphers.- A storage complexity based analogue of Maurer key establishment using public channels.- Soft decision decoding of Reed Solomon codes using the Dorsch algorithm.- Good codes based on very sparse matrices.- Quantum cryptography: Protecting our future networks with quantum mechanics.- Prepaid electronic cheques using public-key certificates.- How traveling salespersons prove their identity.- An elliptic curve analogue of McCurley's key agreement scheme.- Multi-dimensional ring TCM codes for fading channels.- Authentication codes: An area where coding and cryptology meet.- Efficient generation of binary words of given weight.- Distribution of recurrent sequences modulo prime powers.- On-line secret sharing.- Church-Rosser codes.- A new algorithm for finding minimum-weight words in large linear codes.- Coding and cryptography for speech and vision.- Some constructions of generalised concatenated codes based on unit memory codes.- A note on the hash function of Tillich and Zemor.- Cryptanalysis of Harari's identification scheme.- Analysis of sequence segment keying as a method of CDMA transmission.- Constructions for variable-length error-correcting codes.


정보제공 : Aladin

관련분야 신착자료