
Coding And Cryptology - Proceedings Of The First International Workshop
- 288 pages
- English
- PDF
- Available on iOS & Android
Coding And Cryptology - Proceedings Of The First International Workshop
About this book
Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks.The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- CONTENTS
- Preface
- Organizing Committees
- Fuzzy Identity-based Encryption: New and Efficient Schemes J. Baek, W. Susilo and J. Zhou
- A Functional View of Upper Bounds on Codes A. Barg and D. Nogin
- A Method of Construction of Balanced Functions with Optimum Algebraic Immunity C. Carlet
- Enumeration of a Class of Sequences Generated by Inversions A. C e seml_io glu, W. Meidl and A. Topuzo glu
- A Critical Look at Cryptographic Hash Function Literature S. Contini, R. Steinfeld, J. Pieprzyk and K. Matusiewicz
- Scalable Optimal Test Patterns for Crosstalk-induced Faults on Deep Submicron Global Interconnects Y. M. Chee and C. J. Colbourn
- An Improved Distinguisher for Dragon J. Y. Cho and J. Pieprzyk
- Constructing Perfect Hash Families Using a Greedy Algorithm C. J. Colbourn
- Two-Weight Codes Punctured from Irreducible Cyclic Codes C. Ding, J. Luo and H. Niederreiter
- On the Joint Linear Complexity of Linear Recurring Multisequences F. Fu, H. Niederreiter and F. Ozbudak
- Research on P2P Worn Detection Based on Information Correlation-PWDIC H. Hu, J. Zhang, F. Xiao and B. Liu
- On the Relation among Various Security Models for Certi - cateless Cryptography Q. Huang and D. S. Wong
- Distance-Preserving Mappings T. Kl ve
- Single Cycle Invertible Function and its Cryptographic Applications C. Li, B. Sun and Q. Dai
- Concurrent Signatures without a Conventional Keystone Y. Mu, D. S. Wong, L. Chen, W. Susilo and Q. Wu
- Authentication Codes in the Query Model R. Safavi-Naini, D. Tonien and P. R. Wild
- Collision in the DSA Function I. E. Shparlinski and R. Steinfeld
- The Current Status in Design of Efficient Provably Secure Cryptographic Pseudorandom Generators R. Steinfeld
- The Successive Minima Pro le of Multisequences L. Wang and H. Niederreiter
- A Construction of Optimal Sets of FH Sequences J. Yin
- Author Index