03407nam 2200625 450 991081431190332120230803031959.03-486-78126-X10.1524/9783486781267(CKB)2670000000494906(EBL)1377173(SSID)ssj0001154636(PQKBManifestationID)11741599(PQKBTitleCode)TC0001154636(PQKBWorkID)11163142(PQKB)10809755(MiAaPQ)EBC1377173(DE-B1597)219848(OCoLC)1013940329(OCoLC)900720586(DE-B1597)9783486781267(Au-PeEL)EBL1377173(CaPaEBR)ebr10829516(CaONFJC)MIL804611(OCoLC)872677913(EXLCZ)99267000000049490620140131h20132013 uy| 0engurnn#---|u||utxtccrCoding and cryptography synergy for a robust communication /Dr.-Ing. habil. Nataša Živić, Universität SiegenMünchen :Oldenbourg Wissenschaftsverlag,[2013]©20131 online resource (134 p.)Description based upon print version of record.3-486-75212-X Includes bibliographical references.Front matter --Abstract --Table of Contents --1. Introduction --2. Fundamentals --3. Related Work --4. Soft Input Hard Verification --5. Applications of Soft Input Bit Inversion --6. Soft Verification of the Message Authentication Codes --7. Security Aspects of Soft Input Soft Verification --8. Soft Output of Soft Input Soft Verification --9. Applications of Soft Input Soft Verification --10. Summary and Future Work --Epilogue --Works Cited --List of AbbreviationsThis book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesn´t allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or "hard" verification, but even more after the introduction of "soft" verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from "hard" to "soft", which results in much better results.Coding theoryCryptographyCoding theory.Cryptography.520ZN 6045rvkŽivić Nataša1031390MiAaPQMiAaPQMiAaPQBOOK9910814311903321Coding and cryptography3976149UNINA