MARC 닫기
00677nam ac200217 k 4500
000003867339
20220101120000
ta
050927s2004 gw 000 eng
▼a 3540206639
▼a 123456
▼c 123456
▼d 211070
▼l WM7042
▼a QA268
▼a QA268
▼b C76
▼a Paterson, Kenneth G.
▼a Cryptography and Coding : 9th IMA international conference cirencester, UK, december 16-18, 2003 proceedings/
▼d Paterson, Kenneth G.
▼a Berlin:
▼b Springer,
▼c 2004.
▼a ix,383p.;
▼c 24cm.
▼a Lecture Notes in Computer Science;
▼v 2898
▼a Coding theory
▼a Congresses
▼a Cryptography
▼b US$64
▼a 단행본
| 자료유형 : | 단행본 |
|---|---|
| ISBN : | 3540206639 |
| 분류기호 : | QA268 |
| 개인저자 : | Paterson, Kenneth G. |
| 서명/저자사항 : | Cryptography and Coding : 9th IMA international conference cirencester, UK, december 16-18, 2003 proceedings/ Paterson, Kenneth G. |
| 발행사항 : | Berlin: Springer, 2004. |
| 형태사항 : | ix,383p.; 24cm. |
| 총서사항 : | Lecture Notes in Computer Science; 2898 |
| 언어 | 영어 |
Coding and Applications
1. Recent Developments in Array Error-Control Codes
2. High Rate Convolutional Codes with Optimal Cycle Weights
3. A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes
4. Commitment Capacity of Discrete Memoryless Channels
5. Separating and Intersecting Properties of BCH and Kasami Codes
Applications of Coding in Cryptography
1. Analysis and Design of Modern Stream Ciphers
2. Improved Fast Correlation Attack Using Low Rate Codes
3. On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions
4. Degree Optimized Resilient Boolean Functions from Majorana-McFarland Class
5. Differential Uniformity for Arrays
Cryptography
1. Uses and Abuses of Cryptography
2. A Designer''s Guide to KEMs
3. A General Construction of IND-CCA2 Secure Public Key Encryption
4. Efficient Key Updating Signature Schemes Based on IBS
5. Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity
Cryptanalysis
1. Estimates fror Discrete Logarithm Computations in Finite Fields of Small Characteristic
2. Resolving Large Prime(s) Variants for Discrete Logarithm Computation
3. Computing the M=UUt Integer Matrix Decomposition
4. Cryptanalysis of the Public Key Cryptosystem Based on the World Problem on the Grigorchuk Groups
5. More Detail for a Combined Timing and Power Attack against Implementations of RSA
6. Predicting the Inversive Generator
7. A Stochastical Model and Its Analysis for a Physical Random Number Generator Presneted At CHES 2002
8. Analysis of Double Block Length Hash Functions
Network Security and Protocols
1. Cryptography in Wireless Standards
2. On the Correctness of Security Proofs fo rthe 3GPP Confidnetiality and Integrity Algorithms
3. A General Attack Model on Hash-Based Client Puzzles
4. Tripartite Authenticated Key Agreement Protocols from Pairings
5. Remote User Authentication Using Public Information
6. Mental Poker Revisited
Author Index
서평쓰기