LEADER 03407nam 2200625 450 001 9910787757703321 005 20230803031959.0 010 $a3-486-78126-X 024 7 $a10.1524/9783486781267 035 $a(CKB)2670000000494906 035 $a(EBL)1377173 035 $a(SSID)ssj0001154636 035 $a(PQKBManifestationID)11741599 035 $a(PQKBTitleCode)TC0001154636 035 $a(PQKBWorkID)11163142 035 $a(PQKB)10809755 035 $a(MiAaPQ)EBC1377173 035 $a(DE-B1597)219848 035 $a(OCoLC)1013940329 035 $a(OCoLC)900720586 035 $a(DE-B1597)9783486781267 035 $a(Au-PeEL)EBL1377173 035 $a(CaPaEBR)ebr10829516 035 $a(CaONFJC)MIL804611 035 $a(OCoLC)872677913 035 $a(EXLCZ)992670000000494906 100 $a20140131h20132013 uy| 0 101 0 $aeng 135 $aurnn#---|u||u 181 $ctxt 182 $cc 183 $acr 200 10$aCoding and cryptography $esynergy for a robust communication /$fDr.-Ing. habil. Natas?a Z?ivic?, Universita?t Siegen 210 1$aMu?nchen :$cOldenbourg Wissenschaftsverlag,$d[2013] 210 4$dİ2013 215 $a1 online resource (134 p.) 300 $aDescription based upon print version of record. 311 0 $a3-486-75212-X 320 $aIncludes bibliographical references. 327 $tFront matter --$tAbstract --$tTable of Contents --$t1. Introduction --$t2. Fundamentals --$t3. Related Work --$t4. Soft Input Hard Verification --$t5. Applications of Soft Input Bit Inversion --$t6. Soft Verification of the Message Authentication Codes --$t7. Security Aspects of Soft Input Soft Verification --$t8. Soft Output of Soft Input Soft Verification --$t9. Applications of Soft Input Soft Verification --$t10. Summary and Future Work --$tEpilogue --$tWorks Cited --$tList of Abbreviations 330 $aThis book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and 1. The presented methods are novel and designed for noisy communication, which doesn´t allow the successful use of cryptography. The rate of successful verifications is improved essentially not only for standard or "hard" verification, but even more after the introduction of "soft" verification. A security analysis shows the impact on the security. Information security and cryptography follow the late developments of communication theory by changing from "hard" to "soft", which results in much better results. 606 $aCoding theory 606 $aCryptography 615 0$aCoding theory. 615 0$aCryptography. 676 $a520 686 $aZN 6045$2rvk 700 $aZ?ivic?$b Natas?a$01031390 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787757703321 996 $aCoding and cryptography$93770012 997 $aUNINA