Cryptography and Coding: 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 Proceedings: Lecture Notes in Computer Science, cartea 1746
Editat de Michael Walkeren Limba Engleză Paperback – 8 dec 1999
Din seria Lecture Notes in Computer Science
- 20% Preț: 1017.66 lei
- 20% Preț: 322.44 lei
- 20% Preț: 324.00 lei
- 20% Preț: 315.78 lei
- 20% Preț: 238.01 lei
- 20% Preț: 554.59 lei
- 20% Preț: 322.44 lei
- 20% Preț: 438.69 lei
- 20% Preț: 1005.39 lei
- 20% Preț: 325.58 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 969.58 lei
- 20% Preț: 1339.86 lei
- 20% Preț: 782.28 lei
- 17% Preț: 360.19 lei
- 20% Preț: 620.45 lei
- 20% Preț: 307.71 lei
- 20% Preț: 550.29 lei
- 20% Preț: 560.32 lei
- 20% Preț: 319.10 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 256.27 lei
- 20% Preț: 172.69 lei
- 20% Preț: 548.35 lei
- 20% Preț: 315.19 lei
- 20% Preț: 611.22 lei
- 20% Preț: 315.78 lei
- 20% Preț: 552.64 lei
- 20% Preț: 722.40 lei
- 20% Preț: 722.90 lei
- 20% Preț: 301.95 lei
- 20% Preț: 504.57 lei
- 20% Preț: 1120.51 lei
- 20% Preț: 369.12 lei
- 20% Preț: 334.72 lei
- 20% Preț: 552.25 lei
- Preț: 389.06 lei
- 20% Preț: 564.99 lei
- 20% Preț: 723.99 lei
- 20% Preț: 552.25 lei
- 15% Preț: 549.48 lei
- 20% Preț: 331.59 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 369.79 lei
Nou
Puncte Express: 555
Preț estimativ în valută:
70.79€ • 76.87$ • 59.53£
70.79€ • 76.87$ • 59.53£
Carte tipărită la comandă
Livrare economică 14-28 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540668879
ISBN-10: 354066887X
Pagini: 332
Ilustrații: X, 352 p.
Dimensiuni: 155 x 233 x 17 mm
Greutate: 0.47 kg
Ediția:1999
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 354066887X
Pagini: 332
Ilustrații: X, 352 p.
Dimensiuni: 155 x 233 x 17 mm
Greutate: 0.47 kg
Ediția:1999
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Applications of Exponential Sums in Communications Theory.- Some Applications of Bounds for Designs to the Cryptography.- Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions.- Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics?.- A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System.- New Self-Dual Codes over GF(5).- Designs, Intersecting Families, and Weight of Boolean Functions.- Coding Applications in Satellite Communication Systems [Invited Paper].- A Unified Code.- Enhanced Image Coding for Noisy Channels.- Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System.- An Encoding Scheme for Dual Level Access to Broadcasting Networks.- Photograph Signatures for the Protection of Identification Documents.- An Overview of the Isoperimetric Method in Coding Theory (Extended Abstract) [Invited Paper].- Rectangular Basis of a Linear Code.- Graph Decoding of Array Error-Correcting Codes.- Catastrophicity Test for Time-Varying Convolutional Encoders.- Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes.- On Efficient Decoding of Alternant Codes over a Commutative Ring?.- Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes.- Advanced Encryption Standard (AES) - An Update [Invited Paper].- The Piling-Up Lemma and Dependent Random Variables.- A Cryptographic Application of Weil Descent.- Edit Probability Correlation Attack on the Bilateral Stop/Go Generator.- Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems (Extended Abstract).- On the Combined Fermat/Lucas Probable Prime Test?.- On the Cryptanalysis of Nonlinear Sequences [InvitedPaper].- Securing Aeronautical Telecommunications [Invited Paper].- Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography (Extended Abstract).- Delegated Decryption.- Fast and Space-Efficient Adaptive Arithmetic Coding?.- Robust Protocol for Generating Shared RSA Parameters.- Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes.- Weaknesses in Shared RSA Key Generation Protocols.- Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.
Caracteristici
Includes supplementary material: sn.pub/extras