Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings: Lecture Notes in Computer Science, cartea 2260
Editat de Bahram Honaryen Limba Engleză Paperback – 10 dec 2001
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 307.71 lei
- 20% Preț: 438.69 lei
- 20% Preț: 579.30 lei
- Preț: 410.88 lei
- 17% Preț: 427.22 lei
- 20% Preț: 596.46 lei
- 15% Preț: 448.04 lei
- 20% Preț: 353.50 lei
- Preț: 389.49 lei
- 20% Preț: 309.90 lei
- 20% Preț: 645.28 lei
- 20% Preț: 763.23 lei
- 15% Preț: 580.46 lei
- 20% Preț: 310.28 lei
- 20% Preț: 655.02 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 340.32 lei
- Preț: 449.57 lei
- 20% Preț: 591.51 lei
- 18% Preț: 938.83 lei
- 20% Preț: 337.00 lei
- 20% Preț: 649.50 lei
- 20% Preț: 607.40 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 583.40 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.49 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 585.88 lei
- 20% Preț: 825.93 lei
- 17% Preț: 360.20 lei
- 20% Preț: 763.23 lei
- 20% Preț: 340.32 lei
- 20% Preț: 504.58 lei
- 20% Preț: 369.13 lei
- 20% Preț: 580.93 lei
- 20% Preț: 343.62 lei
- 20% Preț: 350.21 lei
- 20% Preț: 583.40 lei
- 20% Preț: 583.40 lei
- 15% Preț: 438.59 lei
- 20% Preț: 341.95 lei
- 20% Preț: 238.01 lei
- 20% Preț: 538.30 lei
Preț: 396.02 lei
Nou
Puncte Express: 594
Preț estimativ în valută:
75.79€ • 78.83$ • 62.57£
75.79€ • 78.83$ • 62.57£
Carte tipărită la comandă
Livrare economică 14-28 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540430261
ISBN-10: 3540430261
Pagini: 432
Ilustrații: IX, 419 p.
Dimensiuni: 155 x 233 x 23 mm
Greutate: 0.6 kg
Ediția:2001
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540430261
Pagini: 432
Ilustrații: IX, 419 p.
Dimensiuni: 155 x 233 x 23 mm
Greutate: 0.6 kg
Ediția:2001
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
A Statistical Decoding Algorithm for General Linear Block Codes.- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory.- The Complete Weight Enumerator for Codes over M nxs(F q).- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem.- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes.- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks.- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs.- The Exact Security of ECIES in the Generic Group Model.- A New Ultrafast Stream Cipher Design: COS Ciphers.- On Rabin-Type Signatures.- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps.- Almost-Certainly Runlength-Limiting Codes.- Weight vs. Magnetization Enumerator for Gallager Codes.- Graph Configurations and Decoding Performance.- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing.- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems.- Improvement of the Delsarte Bound for ?-Designs in Finite Polynomial Metric Spaces.- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding.- The Wide Trail Design Strategy.- Undetachable Threshold Signatures.- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies.- Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation.- Unconditionally Secure Key Agreement Protocol.- An Efficient Stream Cipher Alpha1 for Mobile and WirelessDevices.- Investigation of Linear Codes Possessing Some Extra Properties.- Statistical Physics of Low Density Parity Check Error Correcting Codes.- Generating Large Instances of the Gong-Harn Cryptosystem.- Lattice Attacks on RSA-Encrypted IP and TCP.- Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement.- Attacking the Affine Parts of SFLASH.- An Identity Based Encryption Scheme Based on Quadratic Residues.- Another Way of Doing RSA Cryptography in Hardware.- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers.- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA.- A New Undeniable Signature Scheme Using Smart Cards.- Non-binary Block Inseparable Errors Control Codes.- Cryptanalysis of Nonlinear Filter Generators with (0, 1)-Metric Viterbi Decoding.
Caracteristici
Includes supplementary material: sn.pub/extras