LEADER 07451nam 22008415 450 001 996465293103316 005 20200702134933.0 010 $a3-540-45325-3 024 7 $a10.1007/3-540-45325-3 035 $a(CKB)1000000000211664 035 $a(SSID)ssj0000322397 035 $a(PQKBManifestationID)11238717 035 $a(PQKBTitleCode)TC0000322397 035 $a(PQKBWorkID)10301293 035 $a(PQKB)10631965 035 $a(DE-He213)978-3-540-45325-3 035 $a(MiAaPQ)EBC3072913 035 $a(PPN)155180304 035 $a(EXLCZ)991000000000211664 100 $a20121227d2001 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptography and Coding$b[electronic resource] $e8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings /$fedited by Bahram Honary 205 $a1st ed. 2001. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2001. 215 $a1 online resource (IX, 419 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2260 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-43026-1 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aA Statistical Decoding Algorithm for General Linear Block Codes -- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory -- The Complete Weight Enumerator for Codes over M nxs(F q) -- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem -- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes -- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks -- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs -- The Exact Security of ECIES in the Generic Group Model -- A New Ultrafast Stream Cipher Design: COS Ciphers -- On Rabin-Type Signatures -- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) -- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps -- Almost-Certainly Runlength-Limiting Codes -- Weight vs. Magnetization Enumerator for Gallager Codes -- Graph Configurations and Decoding Performance -- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing -- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems -- Improvement of the Delsarte Bound for ?-Designs in Finite Polynomial Metric Spaces -- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding -- The Wide Trail Design Strategy -- Undetachable Threshold Signatures -- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies -- Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation -- Unconditionally Secure Key Agreement Protocol -- An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices -- Investigation of Linear Codes Possessing Some Extra Properties -- Statistical Physics of Low Density Parity Check Error Correcting Codes -- Generating Large Instances of the Gong-Harn Cryptosystem -- Lattice Attacks on RSA-Encrypted IP and TCP -- Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement -- Attacking the Affine Parts of SFLASH -- An Identity Based Encryption Scheme Based on Quadratic Residues -- Another Way of Doing RSA Cryptography in Hardware -- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers -- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA -- A New Undeniable Signature Scheme Using Smart Cards -- Non-binary Block Inseparable Errors Control Codes -- Cryptanalysis of Nonlinear Filter Generators with (0, 1)-Metric Viterbi Decoding. 330 $aThe mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of ?Cryptography and Coding? was both timely and relevant. The theme of this conference was the future of coding and cryptography, which was touched upon in presentations by a number of invited speakers and researchers. The papers that appear in this book include recent research and development in error control coding and cryptography. These start with mathematical bounds, statistical decoding schemes for error correcting codes, and undetected error probabilities and continue with the theoretical aspects of error correction coding such as graph and trellis decoding, multifunctional and multiple access communication systems, low density parity check codes, and iterative decoding. These are followed by some papers on key recovery attack, authentication, stream cipher design, and analysis of ECIES algorithms, and lattice attacks on IP based protocols. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2260 606 $aData encryption (Computer science) 606 $aComputers 606 $aCoding theory 606 $aInformation theory 606 $aComputer science?Mathematics 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputers. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science?Mathematics. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aTheory of Computation. 615 24$aCoding and Information Theory. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 676 $a005.8/2 702 $aHonary$b Bahram$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465293103316 996 $aCryptography and Coding$9772174 997 $aUNISA