LEADER 05208nam 22007815 450 001 996466118503316 005 20230221050910.0 010 $a3-540-31424-5 024 7 $a10.1007/11617983 035 $a(CKB)1000000000232777 035 $a(SSID)ssj0000316262 035 $a(PQKBManifestationID)11242661 035 $a(PQKBTitleCode)TC0000316262 035 $a(PQKBWorkID)10263191 035 $a(PQKB)10251939 035 $a(DE-He213)978-3-540-31424-0 035 $a(MiAaPQ)EBC3068421 035 $a(PPN)123130786 035 $a(EXLCZ)991000000000232777 100 $a20100419d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aApplied Algebra, Algebraic Algorithms and Error-Correcting Codes$b[electronic resource] $e16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings /$fedited by Marc Fossorier, Hideki Imai, Shu Lin, Alain Poli 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XII, 344 p.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v3857 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-31423-7 320 $aIncludes bibliographical references and index. 327 $aOn Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities -- On Generalized Parity Checks -- Cryptography Based on Bilinear Maps -- The Merit Factor Problem for Binary Sequences -- Quantum Period Reconstruction of Binary Sequences -- The Vector Key Equation and Multisequence Shift Register Synthesis -- A General Framework for Applying FGLM Techniques to Linear Codes -- A Theory of Highly Nonlinear Functions -- The Solutions of the Third Power Sum Equation for Niho Type Decimations -- On Constructing AG Codes Without Basis Functions for Riemann-Roch Spaces -- Computing Gröbner Bases for Vanishing Ideals of Finite Sets of Points -- A Class of Fermat Curves for which Weil-Serre?s Bound Can Be Improved -- Nonbinary Quantum Codes from Hermitian Curves -- A Genetic Algorithm for Cocyclic Hadamard Matrices -- Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication -- A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI -- On Achieving Chosen Ciphertext Security with Decryption Errors -- Applying Fujisaki-Okamoto to Identity-Based Encryption -- A Short Random Fingerprinting Code Against a Small Number of Pirates -- A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation -- Traitor Tracing Against Powerful Attacks Using Combinatorial Designs -- New Bounds on the Capacity of Multi-dimensional RLL-Constrained Systems -- LDPC Codes for Fading Channels: Two Strategies -- Low-Floor Tanner Codes Via Hamming-Node or RSCC-Node Doping -- Algebraic Constructions of Quasi-cyclic LDPC Codes ? Part I: For AWGN and Binary Random Erasure Channels -- Algebraic Construction of Quasi-cyclic LDPC Codes ? Part II: For AWGN and Binary Random and Burst Erasure Channels -- New Constructions of Quasi-cyclic LDPC Codes Based on Two Classes of Balanced Incomplete Block Designs: For AWGN and Binary Erasure Channels -- Long Extended BCH Codes Are Spanned by Minimum Weight Words -- On the Feng-Rao Bound for Generalized Hamming Weights -- Nested Codes for Constrained Memory and for Dirty Paper -- Complementary Sets and Reed-Muller Codes for Peak-to-Average Power Ratio Reduction in OFDM -- Hadamard Codes of Length 2 t s (s Odd). Rank and Kernel. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v3857 606 $aCoding theory 606 $aInformation theory 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science?Mathematics 606 $aDiscrete mathematics 606 $aAlgorithms 606 $aCoding and Information Theory 606 $aCryptology 606 $aDiscrete Mathematics in Computer Science 606 $aAlgorithms 606 $aSymbolic and Algebraic Manipulation 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science?Mathematics. 615 0$aDiscrete mathematics. 615 0$aAlgorithms. 615 14$aCoding and Information Theory. 615 24$aCryptology. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aAlgorithms. 615 24$aSymbolic and Algebraic Manipulation. 676 $a005.72 702 $aFossorier$b Marc$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aImai$b Hideki$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLin$b Shu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPoli$b Alain$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466118503316 996 $aApplied Algebra, Algebraic Algorithms and Error-Correcting Codes$9772419 997 $aUNISA