top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Coding and Cryptology [[electronic resource] ] : Second International Workshop, IWCC 2009 / / edited by Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
Coding and Cryptology [[electronic resource] ] : Second International Workshop, IWCC 2009 / / edited by Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (VIII, 275 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Coding theory
Information theory
Computer science—Mathematics
Computer communication systems
Cryptology
Coding and Information Theory
Discrete Mathematics in Computer Science
Computer Communication Networks
Soggetto genere / forma Kongress.
Zhangjiajie (2009)
ISBN 3-642-01877-7
Classificazione DAT 465f
DAT 580f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity -- Separation and Witnesses -- Binary Covering Arrays and Existentially Closed Graphs -- A Class of Three-Weight and Four-Weight Codes -- Equal-Weight Fingerprinting Codes -- Problems on Two-Dimensional Synchronization Patterns -- A New Client-to-Client Password-Authenticated Key Agreement Protocol -- Elliptic Twin Prime Conjecture -- Hunting for Curves with Many Points -- List Decoding of Binary Codes–A Brief Survey of Some Recent Results -- Recent Developments in Low-Density Parity-Check Codes -- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks -- On Weierstrass Semigroups of Some Triples on Norm-Trace Curves -- ERINDALE: A Polynomial Based Hashing Algorithm -- A Survey of Algebraic Unitary Codes -- New Family of Non-Cartesian Perfect Authentication Codes -- On the Impossibility of Strong Encryption Over -- Minimum Distance between Bent and Resilient Boolean Functions -- Unconditionally Secure Approximate Message Authentication -- Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences -- On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction.
Record Nr. UNISA-996465845203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Coding and Cryptology : Second International Workshop, IWCC 2009 / / edited by Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
Coding and Cryptology : Second International Workshop, IWCC 2009 / / edited by Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (VIII, 275 p.)
Disciplina 005.82
Altri autori (Persone) CheeYeow Meng
LiChao
LingSan
WangHuaxiong
XingChaoping
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Computer science - Mathematics
Discrete mathematics
Computer networks
Cryptology
Coding and Information Theory
Discrete Mathematics in Computer Science
Computer Communication Networks
ISBN 3-642-01877-7
Classificazione DAT 465f
DAT 580f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity -- Separation and Witnesses -- Binary Covering Arrays and Existentially Closed Graphs -- A Class of Three-Weight and Four-Weight Codes -- Equal-Weight Fingerprinting Codes -- Problems on Two-Dimensional Synchronization Patterns -- A New Client-to-Client Password-Authenticated Key Agreement Protocol -- Elliptic Twin Prime Conjecture -- Hunting for Curves with Many Points -- List Decoding of Binary Codes–A Brief Survey of Some Recent Results -- Recent Developments in Low-Density Parity-Check Codes -- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks -- On Weierstrass Semigroups of Some Triples on Norm-Trace Curves -- ERINDALE: A Polynomial Based Hashing Algorithm -- A Survey of Algebraic Unitary Codes -- New Family of Non-Cartesian Perfect Authentication Codes -- On the Impossibility of Strong Encryption Over -- Minimum Distance between Bent and Resilient Boolean Functions -- Unconditionally Secure Approximate Message Authentication -- Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences -- On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction.
Record Nr. UNINA-9910483965103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptography and Coding [[electronic resource] ] : 12th IMA International Conference, IMACC 2009, Cirencester, UK, December 15-17, 2009, Proceedings / / edited by Matthew G. Parker
Cryptography and Coding [[electronic resource] ] : 12th IMA International Conference, IMACC 2009, Cirencester, UK, December 15-17, 2009, Proceedings / / edited by Matthew G. Parker
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 495 p.)
Disciplina 512
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Coding theory
Information theory
Computer science—Mathematics
Data structures (Computer science)
Computer security
Cryptology
Coding and Information Theory
Symbolic and Algebraic Manipulation
Data Structures and Information Theory
Systems and Data Security
Discrete Mathematics in Computer Science
Soggetto genere / forma Cirencester (2009)
Kongress.
ISBN 3-642-10868-7
Classificazione DAT 465f
DAT 580f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Coding Theory -- Subspace Codes -- On Linear Programming Decoding on a Quantized Additive White Gaussian Noise Channel -- Codes as Modules over Skew Polynomial Rings -- On Higher Weights and Code Existence -- Mass Formula for Even Codes over -- On the Classification of Self-dual -Codes -- On Linear Codes from Maximal Curves -- Symmetric Cryptography -- On Linear Cryptanalysis with Many Linear Approximations -- Bivium as a Mixed-Integer Linear Programming Problem -- Security of Cyclic Double Block Length Hash Functions -- Another Glance at Double-Length Hashing -- Geometric Ideas for Cryptographic Equation Solving in Even Characteristic -- Security Protocols -- Provably Secure Code-Based Threshold Ring Signatures -- A New Protocol for the Nearby Friend Problem -- Distributing the Key Distribution Centre in Sakai–Kasahara Based Systems -- Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes -- Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes -- Certificate-Free Attribute Authentication -- Asymmetric Cryptography -- Comparing with RSA -- Double-Exponentiation in Factor-4 Groups and Its Applications -- Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms -- An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems -- Boolean Functions -- On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions -- A New Family of Hyper-Bent Boolean Functions in Polynomial Form -- The Rayleigh Quotient of Bent Functions -- Side Channels and Implementations -- Cache Timing Analysis of LFSR-Based Stream Ciphers -- Optimal Recovery of Secret Keys from Weak Side Channel Traces -- Practical Zero-Knowledge Proofs for Circuit Evaluation.
Record Nr. UNISA-996465914303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptography and Coding : 12th IMA International Conference, IMACC 2009, Cirencester, UK, December 15-17, 2009, Proceedings / / edited by Matthew G. Parker
Cryptography and Coding : 12th IMA International Conference, IMACC 2009, Cirencester, UK, December 15-17, 2009, Proceedings / / edited by Matthew G. Parker
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 495 p.)
Disciplina 512
Altri autori (Persone) ParkerMatthew G
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Computer science - Mathematics
Data structures (Computer science)
Data protection
Discrete mathematics
Cryptology
Coding and Information Theory
Symbolic and Algebraic Manipulation
Data Structures and Information Theory
Data and Information Security
Discrete Mathematics in Computer Science
ISBN 3-642-10868-7
Classificazione DAT 465f
DAT 580f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Coding Theory -- Subspace Codes -- On Linear Programming Decoding on a Quantized Additive White Gaussian Noise Channel -- Codes as Modules over Skew Polynomial Rings -- On Higher Weights and Code Existence -- Mass Formula for Even Codes over -- On the Classification of Self-dual -Codes -- On Linear Codes from Maximal Curves -- Symmetric Cryptography -- On Linear Cryptanalysis with Many Linear Approximations -- Bivium as a Mixed-Integer Linear Programming Problem -- Security of Cyclic Double Block Length Hash Functions -- Another Glance at Double-Length Hashing -- Geometric Ideas for Cryptographic Equation Solving in Even Characteristic -- Security Protocols -- Provably Secure Code-Based Threshold Ring Signatures -- A New Protocol for the Nearby Friend Problem -- Distributing the Key Distribution Centre in Sakai–Kasahara Based Systems -- Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes -- Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes -- Certificate-Free Attribute Authentication -- Asymmetric Cryptography -- Comparing with RSA -- Double-Exponentiation in Factor-4 Groups and Its Applications -- Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms -- An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems -- Boolean Functions -- On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions -- A New Family of Hyper-Bent Boolean Functions in Polynomial Form -- The Rayleigh Quotient of Bent Functions -- Side Channels and Implementations -- Cache Timing Analysis of LFSR-Based Stream Ciphers -- Optimal Recovery of Secret Keys from Weak Side Channel Traces -- Practical Zero-Knowledge Proofs for Circuit Evaluation.
Record Nr. UNINA-9910483363903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui