注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络信息安全编码与密码术:WCC 2005/会议文集

编码与密码术:WCC 2005/会议文集

编码与密码术:WCC 2005/会议文集

定 价:¥678.00

作 者: Øyvind Ytrehus 著
出版社: 崇文书局(原湖北辞书出版社)
丛编项:
标 签: 暂缺

购买这本书可以去


ISBN: 9783540354819 出版时间: 2006-12-01 包装: 平装
开本: 页数: 字数:  

内容简介

  This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005.The 33 revised full papers were carefully reviewed and selected during two rounds of reviewing and improvement from 118 submissions. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied. Topics covered are: coding theory, i.e., error-correcting codes, decoding algorithms, and related combinatorial problems; cryptology, i.e., block and stream ciphers, hash functions, public key cryptography, secret sharing, authentication, and intellectual property protection; and discrete mathematics and algorithmic tools arising from these two areas, such as boolean functions, sequences, finite fields, algebraic systems and related polynomial properties.

作者简介

暂缺《编码与密码术:WCC 2005/会议文集》作者简介

图书目录

Second Support Weights for Binary Self-dual Codes
On Codes Correcting Symmetric Rank Errors
Error and Erasure Correction of Interleaved Reed-Solomon Codes
A Welch Berlekamp Like Algorithm for Decoding Gabidulin Codes
On the Weights of Binary Irreducible Cyclic Codes
3-Designs from Z4-Goethals-Like Codes and Variants of Cyclotomic Polynomials
Space-Time Code Designs Based on the Generalized Binary Rank
Criterion with Applications to Cooperative Diversity
Geometric Conditions for the Extendability of Ternary Linear Codes
On the Design of Codes for DNA Computing
Open Problems Related to Algebraic Attacks on Stream Ciphers
On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two
Interpolation of Functions Related to the Integer Factoring Problem
On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography
Finding Good Differential Patterns for Attacks on SHA-1
Extending Gibson's Attacks on the GPT Cryptosystem
Reduction of Conjugacy Problem in Braid Groups, Using Two Garside
Structures
A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy
Multi-Dimensional Hash Chains and Application to Micropayment Schemes
On the Affine Transformations of HFE-Cryptosystems and Systems with Branches
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
RSA-Based Secret Handshakes
On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes
ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps
A New Public-Key Cryptosystem Based on the Problem of Reconstructing o-Polynomials
On the Wagner Magyarik Cryptosystem
……
Author Index

本目录推荐