LEADER 05363nam 22008175 450 001 9910483585003321 005 20251226202436.0 010 $a3-540-31424-5 024 7 $a10.1007/11617983 035 $a(CKB)1000000000232777 035 $a(SSID)ssj0000316262 035 $a(PQKBManifestationID)11242661 035 $a(PQKBTitleCode)TC0000316262 035 $a(PQKBWorkID)10263191 035 $a(PQKB)10251939 035 $a(DE-He213)978-3-540-31424-0 035 $a(MiAaPQ)EBC3068421 035 $a(PPN)123130786 035 $a(BIP)32371752 035 $a(BIP)13248044 035 $a(EXLCZ)991000000000232777 100 $a20100419d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aApplied Algebra, Algebraic Algorithms and Error-Correcting Codes $e16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings /$fedited by Marc Fossorier, Hideki Imai, Shu Lin, Alain Poli 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XII, 344 p.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v3857 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-31423-7 320 $aIncludes bibliographical references and index. 327 $aOn Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities -- On Generalized Parity Checks -- Cryptography Based on Bilinear Maps -- The Merit Factor Problem for Binary Sequences -- Quantum Period Reconstruction of Binary Sequences -- The Vector Key Equation and Multisequence Shift Register Synthesis -- A General Framework for Applying FGLM Techniques to Linear Codes -- A Theory of Highly Nonlinear Functions -- The Solutions of the Third Power Sum Equation for Niho Type Decimations -- On Constructing AG Codes Without Basis Functions for Riemann-Roch Spaces -- Computing Gröbner Bases for Vanishing Ideals of Finite Sets of Points -- A Class of Fermat Curves for which Weil-Serre?s Bound Can Be Improved -- Nonbinary Quantum Codes from Hermitian Curves -- A Genetic Algorithm for Cocyclic Hadamard Matrices -- Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication -- A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI -- On Achieving Chosen Ciphertext Security with Decryption Errors -- Applying Fujisaki-Okamoto to Identity-Based Encryption -- A Short Random Fingerprinting Code Against a Small Number of Pirates -- A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation -- Traitor Tracing Against Powerful Attacks Using Combinatorial Designs -- New Bounds on the Capacity of Multi-dimensional RLL-Constrained Systems -- LDPC Codes for Fading Channels: Two Strategies -- Low-Floor Tanner Codes Via Hamming-Node or RSCC-Node Doping -- Algebraic Constructions of Quasi-cyclic LDPC Codes ? Part I: For AWGN and Binary Random Erasure Channels -- Algebraic Construction of Quasi-cyclic LDPC Codes ? Part II: For AWGN and Binary Random and Burst ErasureChannels -- New Constructions of Quasi-cyclic LDPC Codes Based on Two Classes of Balanced Incomplete Block Designs: For AWGN and Binary Erasure Channels -- Long Extended BCH Codes Are Spanned by Minimum Weight Words -- On the Feng-Rao Bound for Generalized Hamming Weights -- Nested Codes for Constrained Memory and for Dirty Paper -- Complementary Sets and Reed-Muller Codes for Peak-to-Average Power Ratio Reduction in OFDM -- Hadamard Codes of Length 2 t s (s Odd). Rank and Kernel. 330 $aThe 25 revised full papers presented here together with 7 invited papers address subjects such as block codes; algebra and codes: rings, fields, and AG codes; cryptography; sequences; decoding algorithms; and algebra: constructions in algebra, Galois groups, differential algebra, and polynomials. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v3857 606 $aCoding theory 606 $aInformation theory 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aAlgorithms 606 $aCoding and Information Theory 606 $aCryptology 606 $aDiscrete Mathematics in Computer Science 606 $aAlgorithms 606 $aSymbolic and Algebraic Manipulation 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aAlgorithms. 615 14$aCoding and Information Theory. 615 24$aCryptology. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aAlgorithms. 615 24$aSymbolic and Algebraic Manipulation. 676 $a005.72 701 $aFossorier$b Marc$f1964-$01750482 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483585003321 996 $aApplied algebra, algebraic algorithms and error-correcting codes$94185124 997 $aUNINA