Coding And Cryptology - Proceedings Of The First International Workshop
eBook - PDF

Coding And Cryptology - Proceedings Of The First International Workshop

  1. 288 pages
  2. English
  3. PDF
  4. Available on iOS & Android
eBook - PDF

Coding And Cryptology - Proceedings Of The First International Workshop

About this book

Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks.The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Coding And Cryptology - Proceedings Of The First International Workshop by Huaxiong Wang, Yongqing Li, San Ling in PDF and/or ePUB format, as well as other popular books in Biological Sciences & Science General. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. CONTENTS
  2. Preface
  3. Organizing Committees
  4. Fuzzy Identity-based Encryption: New and Efficient Schemes J. Baek, W. Susilo and J. Zhou
  5. A Functional View of Upper Bounds on Codes A. Barg and D. Nogin
  6. A Method of Construction of Balanced Functions with Optimum Algebraic Immunity C. Carlet
  7. Enumeration of a Class of Sequences Generated by Inversions A. C e seml_io glu, W. Meidl and A. Topuzo glu
  8. A Critical Look at Cryptographic Hash Function Literature S. Contini, R. Steinfeld, J. Pieprzyk and K. Matusiewicz
  9. Scalable Optimal Test Patterns for Crosstalk-induced Faults on Deep Submicron Global Interconnects Y. M. Chee and C. J. Colbourn
  10. An Improved Distinguisher for Dragon J. Y. Cho and J. Pieprzyk
  11. Constructing Perfect Hash Families Using a Greedy Algorithm C. J. Colbourn
  12. Two-Weight Codes Punctured from Irreducible Cyclic Codes C. Ding, J. Luo and H. Niederreiter
  13. On the Joint Linear Complexity of Linear Recurring Multisequences F. Fu, H. Niederreiter and F. Ozbudak
  14. Research on P2P Worn Detection Based on Information Correlation-PWDIC H. Hu, J. Zhang, F. Xiao and B. Liu
  15. On the Relation among Various Security Models for Certi - cateless Cryptography Q. Huang and D. S. Wong
  16. Distance-Preserving Mappings T. Kl ve
  17. Single Cycle Invertible Function and its Cryptographic Applications C. Li, B. Sun and Q. Dai
  18. Concurrent Signatures without a Conventional Keystone Y. Mu, D. S. Wong, L. Chen, W. Susilo and Q. Wu
  19. Authentication Codes in the Query Model R. Safavi-Naini, D. Tonien and P. R. Wild
  20. Collision in the DSA Function I. E. Shparlinski and R. Steinfeld
  21. The Current Status in Design of Efficient Provably Secure Cryptographic Pseudorandom Generators R. Steinfeld
  22. The Successive Minima Pro le of Multisequences L. Wang and H. Niederreiter
  23. A Construction of Optimal Sets of FH Sequences J. Yin
  24. Author Index