Coding and Cryptography
Springer Berlin (Verlag)
978-3-540-35481-9 (ISBN)
Second Support Weights for Binary Self-dual Codes.- On Codes Correcting Symmetric Rank Errors.- Error and Erasure Correction of Interleaved Reed-Solomon Codes.- A Welch-Berlekamp Like Algorithm for Decoding Gabidulin Codes.- On the Weights of Binary Irreducible Cyclic Codes.- 3-Designs from Z 4-Goethals-Like Codes and Variants of Cyclotomic Polynomials.- Space-Time Code Designs Based on the Generalized Binary Rank Criterion with Applications to Cooperative Diversity.- Geometric Conditions for the Extendability of Ternary Linear Codes.- On the Design of Codes for DNA Computing.- Open Problems Related to Algebraic Attacks on Stream Ciphers.- On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two.- Interpolation of Functions Related to the Integer Factoring Problem.- On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography.- Finding Good Differential Patterns for Attacks on SHA-1.- Extending Gibson's Attacks on the GPT Cryptosystem.- Reduction of Conjugacy Problem in Braid Groups, Using Two Garside Structures.- A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy.- Multi-Dimensional Hash Chains and Application to Micropayment Schemes.- On the Affine Transformations of HFE-Cryptosystems and Systems with Branches.- Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems.- RSA-Based Secret Handshakes.- On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes.- ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps.- A New Public-Key Cryptosystem Based on the Problem of Reconstructing p-Polynomials.- On the Wagner-Magyarik Cryptosystem.- Constructions ofComplementary Sequences for Power-Controlled OFDM Transmission.- A Novel Method for Constructing Almost Perfect Polyphase Sequences.- Linear Filtering of Nonlinear Shift-Register Sequences.- Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation.- Frequency/Time Hopping Sequences with Large Linear Complexities.- One and Two-Variable Interlace Polynomials: A Spectral Interpretation.- Improved Bounds on Weil Sums over Galois Rings and Homogeneous Weights.- Locally Invertible Multivariate Polynomial Matrices.
Erscheint lt. Verlag | 6.7.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 444 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 774 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • authentication • Code • Coding • coding theory • Cryptanalysis • Cryptographic Attacks • cryptography • Cryptology • Cryptosystems • Decoding • Elliptic Curve Cryptography • encryption schemes • error-correcting code • Error-correcting codes • finite field • number theoretic foundations • Public-key systems • Secret Sharing • Signatures • symmetric cryptography • Time Hopping |
ISBN-10 | 3-540-35481-6 / 3540354816 |
ISBN-13 | 978-3-540-35481-9 / 9783540354819 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich