Coding and cryptography : International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers

Bibliographic Information

Coding and cryptography : International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers

Øyvind Ytrehus (ed.)

(Lecture notes in computer science, 3969)

Springer, c2006

Available at  / 16 libraries

Search this Book/Journal

Note

Includes bibliographical references and index

Description and Table of Contents

Description

This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005. The 33 revised full papers were carefully reviewed and selected during two rounds of review. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied.

Table of Contents

Second Support Weights for Binary Self-dual Codes.- On Codes Correcting Symmetric Rank Errors.- Error and Erasure Correction of Interleaved Reed-Solomon Codes.- A Welch-Berlekamp Like Algorithm for Decoding Gabidulin Codes.- On the Weights of Binary Irreducible Cyclic Codes.- 3-Designs from Z 4-Goethals-Like Codes and Variants of Cyclotomic Polynomials.- Space-Time Code Designs Based on the Generalized Binary Rank Criterion with Applications to Cooperative Diversity.- Geometric Conditions for the Extendability of Ternary Linear Codes.- On the Design of Codes for DNA Computing.- Open Problems Related to Algebraic Attacks on Stream Ciphers.- On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two.- Interpolation of Functions Related to the Integer Factoring Problem.- On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography.- Finding Good Differential Patterns for Attacks on SHA-1.- Extending Gibson's Attacks on the GPT Cryptosystem.- Reduction of Conjugacy Problem in Braid Groups, Using Two Garside Structures.- A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy.- Multi-Dimensional Hash Chains and Application to Micropayment Schemes.- On the Affine Transformations of HFE-Cryptosystems and Systems with Branches.- Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems.- RSA-Based Secret Handshakes.- On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes.- ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps.- A New Public-Key Cryptosystem Based on the Problem of Reconstructing p-Polynomials.- On the Wagner-Magyarik Cryptosystem.- Constructions of Complementary Sequences for Power-Controlled OFDM Transmission.- A Novel Method for Constructing Almost Perfect Polyphase Sequences.- Linear Filtering of Nonlinear Shift-Register Sequences.- Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation.- Frequency/Time Hopping Sequences with Large Linear Complexities.- One and Two-Variable Interlace Polynomials: A Spectral Interpretation.- Improved Bounds on Weil Sums over Galois Rings and Homogeneous Weights.- Locally Invertible Multivariate Polynomial Matrices.

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

  • NCID
    BA77655899
  • ISBN
    • 3540354816
  • LCCN
    2006927431
  • Country Code
    gw
  • Title Language Code
    eng
  • Text Language Code
    eng
  • Place of Publication
    Berlin
  • Pages/Volumes
    xi, 441 p.
  • Size
    24 cm
  • Classification
  • Parent Bibliography ID
Page Top