LEADER 04012oam 2200541 450 001 9910143614503321 005 20210807194647.0 010 $a3-540-46665-7 024 7 $a10.1007/3-540-46665-7 035 $a(CKB)1000000000211340 035 $a(SSID)ssj0000322400 035 $a(PQKBManifestationID)11234014 035 $a(PQKBTitleCode)TC0000322400 035 $a(PQKBWorkID)10282911 035 $a(PQKB)10117833 035 $a(DE-He213)978-3-540-46665-9 035 $a(MiAaPQ)EBC3072131 035 $a(MiAaPQ)EBC6494919 035 $a(PPN)155169769 035 $a(EXLCZ)991000000000211340 100 $a20210807d1999 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aCryptography and coding $e7th ima conference, cirencester, uk, december 20-22, 1999 : proceedings /$fedited by Michael, Jr. Walker 205 $a1st ed. 1999. 210 1$aBerlin, Germany :$cSpringer,$d[1999] 210 4$d©1999 215 $a1 online resource (X, 352 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1746 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-66887-X 320 $aIncludes bibliographical references and index. 327 $aApplications of Exponential Sums in Communications Theory -- Some Applications of Bounds for Designs to the Cryptography -- Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions -- Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics? -- A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System -- New Self-Dual Codes over GF(5) -- Designs, Intersecting Families, and Weight of Boolean Functions -- Coding Applications in Satellite Communication Systems [Invited Paper] -- A Unified Code -- Enhanced Image Coding for Noisy Channels -- Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System -- An Encoding Scheme for Dual Level Access to Broadcasting Networks -- Photograph Signatures for the Protection of Identification Documents -- An Overview of the Isoperimetric Method in Coding Theory (Extended Abstract) [Invited Paper] -- Rectangular Basis of a Linear Code -- Graph Decoding of Array Error-Correcting Codes -- Catastrophicity Test for Time-Varying Convolutional Encoders -- Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes -- On Efficient Decoding of Alternant Codes over a Commutative Ring? -- Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes -- Advanced Encryption Standard (AES) - An Update [Invited Paper] -- The Piling-Up Lemma and Dependent Random Variables -- A Cryptographic Application of Weil Descent -- Edit Probability Correlation Attack on the Bilateral Stop/Go Generator -- Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems (Extended Abstract) -- On the Combined Fermat/Lucas Probable Prime Test? -- On the Cryptanalysis of Nonlinear Sequences [Invited Paper] -- Securing Aeronautical Telecommunications [Invited Paper] -- Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography (Extended Abstract) -- Delegated Decryption -- Fast and Space-Efficient Adaptive Arithmetic Coding? -- Robust Protocol for Generating Shared RSA Parameters -- Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes -- Weaknesses in Shared RSA Key Generation Protocols -- Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1746 606 $aCoding theory 615 0$aCoding theory. 676 $a003.54 702 $aWalker$b Michael$f1947- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a9910143614503321 996 $aCryptography and Coding$9772174 997 $aUNINA