Coding and Cryptology
An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity.- Separation and Witnesses.- Binary Covering Arrays and Existentially Closed Graphs.- A Class of Three-Weight and Four-Weight Codes.- Equal-Weight Fingerprinting Codes.- Problems on Two-Dimensional Synchronization Patterns.- A New Client-to-Client Password-Authenticated Key Agreement Protocol.- Elliptic Twin Prime Conjecture.- Hunting for Curves with Many Points.- List Decoding of Binary Codes-A Brief Survey of Some Recent Results.- Recent Developments in Low-Density Parity-Check Codes.- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks.- On Weierstrass Semigroups of Some Triples on Norm-Trace Curves.- ERINDALE: A Polynomial Based Hashing Algorithm.- A Survey of Algebraic Unitary Codes.- New Family of Non-Cartesian Perfect Authentication Codes.- On the Impossibility of Strong Encryption Over .- Minimum Distance between Bent and Resilient Boolean Functions.- Unconditionally Secure Approximate Message Authentication.- Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences.- On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction.
| Erscheint lt. Verlag | 20.5.2009 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | VIII, 275 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 433 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Access Control • algebraic attack • authentication • biometrics • block cipher • boolean function • coding theory • Combinatorial Designs • Communication • Cryptanalysis • Cryptographic Attacks • cryptography • Cryptology • Cryptosystems • cyclotomy • Decoding • encryption schemes • Error-correcting codes • generalized hashing • key predistribution • linear codes • number theoretic foundations • perfect sequence • provable security • Public-key systems • Secret Sharing • sensor networks • Signatures • spoofing attacks • symmetric cryptography • unconditional security |
| ISBN-13 | 9783642018138 / 9783642018138 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich