HOME > 상세정보

상세정보

Cryptography and coding : 6th IMA International Conference, Cirencester, UK, December 17-19, 1997 : proceedings

Cryptography and coding : 6th IMA International Conference, Cirencester, UK, December 17-19, 1997 : proceedings

자료유형
단행본
개인저자
Darnell, Mike.
서명 / 저자사항
Cryptography and coding : 6th IMA International Conference, Cirencester, UK, December 17-19, 1997 : proceedings / Michael Darnell (ed.).
발행사항
Berlin ;   New York :   Springer,   c1997.  
형태사항
ix, 334 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1355
ISBN
3540639276 (pbk. : alk. paper) 9783540639275 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Coding theory -- Congresses. Cryptography -- Congresses.
000 01497camuu2200361 a 4500
001 000045561542
005 20091125152312
008 971118s1997 gw b 101 0 eng
010 ▼a 97048262
020 ▼a 3540639276 (pbk. : alk. paper)
020 ▼a 9783540639275 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm38002629
035 ▼a (OCoLC)38002629
035 ▼a (KERIS)REF000004105654
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a QA268 ▼b .C76 1997
082 0 0 ▼a 003/.54 ▼2 21
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b I31c ▼c 6
111 2 ▼a IMA International Conference ▼n (6th : ▼d 1997 : ▼c Cirencester, England)
245 1 0 ▼a Cryptography and coding : ▼b 6th IMA International Conference, Cirencester, UK, December 17-19, 1997 : proceedings / ▼c Michael Darnell (ed.).
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c1997.
300 ▼a ix, 334 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1355
504 ▼a Includes bibliographical references and index.
650 0 ▼a Coding theory ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Darnell, Mike.
830 0 ▼a Lecture notes in computer science ; ▼v 1355.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I31c 6 등록번호 121186502 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

The theory and application of reciprocal pairs of periodic sequences.- Zero-error codes for correlated information sources.- Trellis decoding techniques and their performance in the adder channel for synchronous and asynchronous CCMA codes.- Key agreement protocols and their security analysis.- Low density parity check codes based on sparse matrices with no small cycles.- On the SAFER cryptosystem.- An adaptive approach to T of N user multi-access communications channel using an orthogonal coded multiplexer.- The breaking of the Lorenz Cipher: An introduction to the theory behind the operational role of "Colossus" at BP.- Split knowledge generation of RSA parameters.- Analysis of error control in digital trunked radio systems.- Reconstruction of convolutional encoders over GF(q).- HCC: A hash function using error correcting codes.- Public-key cryptosystems based on elliptic curves.- Novel application of turbo decoding for radio channels.- Finding small roots of univariate modular equations revisited.- Robust Reed Solomon coded MPSK modulation.- RSA-type signatures in the presence of transient faults.- A digital signature scheme based on random error-correcting codes.- Variable rate adaptive trellis coded QAM for high bandwidth efficiency applications under Rayleigh fading channel.- Variable rate adaptive channel coding for coherent and non-coherent rayleigh fading channel.- Labyrinth: A new ultra high speed stream cipher.- Resisting the Bergen-Hogan attack on adaptive arithmetic coding.- Novel decoding technique for the synchronous and quasi-synchronous multiple access adder channel.- Increasing efficiency of International key escrow in mutually mistrusting domains.- Multi dimensional compartment schemes.- Evaluation of standard approximation to log-likelihood ratio addition in the MAP algorithm, and Its application in block code ('Turbo') Iterative decoding algorithms.- Multiuser coding based on detecting matrices for Synchronous-CDMA systems.- Enumeration of convolutional codes and minimal encoders.- On using Carmichael numbers for public key encryption systems.- Hash functions and MAC algorithms based on block ciphers.- Witness hiding restrictive blind signature scheme.- A note on the construction and upper bounds of correlation-immune functions.- On generalised concatenated codes.- Error performance analysis of different interleaving strategies applied to eight track digital tape systems.- Efficient error-propagating block chaining.


정보제공 : Aladin

관련분야 신착자료