Muutke küpsiste eelistusi

Coding and Cryptology: Second International Workshop, IWCC 2009 2009 ed. [Pehme köide]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 275 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, VIII, 275 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 5557
  • Ilmumisaeg: 20-May-2009
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642018130
  • ISBN-13: 9783642018138
Teised raamatud teemal:
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 275 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, VIII, 275 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 5557
  • Ilmumisaeg: 20-May-2009
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642018130
  • ISBN-13: 9783642018138
Teised raamatud teemal:
This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009. The 21 revised full technical papers, except one, are contributed by the invited speakers of the workshop. The papers were carefully selected during two rounds of reviewing and improvement for inclusion in the volume and address all aspects of coding theory, cryptology and related areas - such as combinatorics - theoretical or applied. Topics addressed are coding theory, secure codes, hash functions, combinatorics, boolean functions, authentication, cryptography, protocols, sequences, and secure communications.
An Infinite Class of Balanced Vectorial Boolean Functions with Optimum
Algebraic Immunity and Good Nonlinearity.- Separation and Witnesses.- Binary
Covering Arrays and Existentially Closed Graphs.- A Class of Three-Weight and
Four-Weight Codes.- Equal-Weight Fingerprinting Codes.- Problems on
Two-Dimensional Synchronization Patterns.- A New Client-to-Client
Password-Authenticated Key Agreement Protocol.- Elliptic Twin Prime
Conjecture.- Hunting for Curves with Many Points.- List Decoding of Binary
CodesA Brief Survey of Some Recent Results.- Recent Developments in
Low-Density Parity-Check Codes.- On the Applicability of Combinatorial
Designs to Key Predistribution for Wireless Sensor Networks.- On Weierstrass
Semigroups of Some Triples on Norm-Trace Curves.- ERINDALE: A Polynomial
Based Hashing Algorithm.- A Survey of Algebraic Unitary Codes.- New Family of
Non-Cartesian Perfect Authentication Codes.- On the Impossibility of Strong
Encryption Over .- Minimum Distance between Bent and Resilient Boolean
Functions.- Unconditionally Secure Approximate Message Authentication.-
Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level
Autocorrelation Sequences.- On Cayley Graphs, Surface Codes, and the Limits
of Homological Coding for Quantum Error Correction.