注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁出版圖書科學(xué)技術(shù)計算機/網(wǎng)絡(luò)信息安全編碼與密碼術(shù):WCC 2005/會議文集

編碼與密碼術(shù):WCC 2005/會議文集

編碼與密碼術(shù):WCC 2005/會議文集

定 價:¥678.00

作 者: Øyvind Ytrehus 著
出版社: 崇文書局(原湖北辭書出版社)
叢編項:
標(biāo) 簽: 暫缺

ISBN: 9783540354819 出版時間: 2006-12-01 包裝: 平裝
開本: 頁數(shù): 字?jǐn)?shù):  

內(nèi)容簡介

  This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005.The 33 revised full papers were carefully reviewed and selected during two rounds of reviewing and improvement from 118 submissions. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied. Topics covered are: coding theory, i.e., error-correcting codes, decoding algorithms, and related combinatorial problems; cryptology, i.e., block and stream ciphers, hash functions, public key cryptography, secret sharing, authentication, and intellectual property protection; and discrete mathematics and algorithmic tools arising from these two areas, such as boolean functions, sequences, finite fields, algebraic systems and related polynomial properties.

作者簡介

暫缺《編碼與密碼術(shù):WCC 2005/會議文集》作者簡介

圖書目錄

Second Support Weights for Binary Self-dual Codes
On Codes Correcting Symmetric Rank Errors
Error and Erasure Correction of Interleaved Reed-Solomon Codes
A Welch Berlekamp Like Algorithm for Decoding Gabidulin Codes
On the Weights of Binary Irreducible Cyclic Codes
3-Designs from Z4-Goethals-Like Codes and Variants of Cyclotomic Polynomials
Space-Time Code Designs Based on the Generalized Binary Rank
Criterion with Applications to Cooperative Diversity
Geometric Conditions for the Extendability of Ternary Linear Codes
On the Design of Codes for DNA Computing
Open Problems Related to Algebraic Attacks on Stream Ciphers
On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two
Interpolation of Functions Related to the Integer Factoring Problem
On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography
Finding Good Differential Patterns for Attacks on SHA-1
Extending Gibson's Attacks on the GPT Cryptosystem
Reduction of Conjugacy Problem in Braid Groups, Using Two Garside
Structures
A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy
Multi-Dimensional Hash Chains and Application to Micropayment Schemes
On the Affine Transformations of HFE-Cryptosystems and Systems with Branches
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
RSA-Based Secret Handshakes
On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes
ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps
A New Public-Key Cryptosystem Based on the Problem of Reconstructing o-Polynomials
On the Wagner Magyarik Cryptosystem
……
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號