Coding and Cryptology
Springer Berlin (Verlag)
978-3-642-01813-8 (ISBN)
An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity.- Separation and Witnesses.- Binary Covering Arrays and Existentially Closed Graphs.- A Class of Three-Weight and Four-Weight Codes.- Equal-Weight Fingerprinting Codes.- Problems on Two-Dimensional Synchronization Patterns.- A New Client-to-Client Password-Authenticated Key Agreement Protocol.- Elliptic Twin Prime Conjecture.- Hunting for Curves with Many Points.- List Decoding of Binary Codes-A Brief Survey of Some Recent Results.- Recent Developments in Low-Density Parity-Check Codes.- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks.- On Weierstrass Semigroups of Some Triples on Norm-Trace Curves.- ERINDALE: A Polynomial Based Hashing Algorithm.- A Survey of Algebraic Unitary Codes.- New Family of Non-Cartesian Perfect Authentication Codes.- On the Impossibility of Strong Encryption Over .- Minimum Distance between Bent and Resilient Boolean Functions.- Unconditionally Secure Approximate Message Authentication.- Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences.- On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction.
Erscheint lt. Verlag | 20.5.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | VIII, 275 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 433 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • algebraic attack • authentication • biometrics • block cipher • boolean function • coding theory • Combinatorial Designs • Communication • Cryptanalysis • Cryptographic Attacks • cryptography • Cryptology • Cryptosystems • cyclotomy • Decoding • encryption schemes • Error-correcting codes • generalized hashing • key predistribution • linear codes • number theoretic foundations • perfect sequence • provable security • Public-key systems • Secret Sharing • sensor networks • Signatures • spoofing attacks • symmetric cryptography • unconditional security |
ISBN-10 | 3-642-01813-0 / 3642018130 |
ISBN-13 | 978-3-642-01813-8 / 9783642018138 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich