Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008301854/catalog> ?p ?o. }
Showing items 1 to 32 of
32
with 100 items per page.
- catalog abstract "The IMA conferences onCryptographyandCoding arenotonly a blend of these two aspects of information theory, but a blend of mathematics and engineering and of theoretical results and applications. The papers in this book show that the1999conferencewasnoexception. Indeed,weagainsawthemathematics- derlyingcryptographyanderrorcorrectingcodingbeing appliedto otheraspects ofcommunications,andwe alsosawclassicalmathematicalconcepts nding new applications in communications theory. As usual the conference was held at the Royal Agricultural College, Cirencester, shortly before Christmas - this time 20-22 December 1999. The papers appear in this book in the order in which they were presented, grouped into sessions,eachsessionbeginning with an invited paper. Theseinvited papers were intended to re?ect the invitees’ views on the future of their subject - or more accurately where they intended to take it. Indeed the focus of the conf- encewas thefutureofcryptographyandcoding as seenthroughtheeyes ofyoung researchers. The r st group of papers is concerned with mathematical bounds, concepts, and constructions that form a common thread running through error corre- ing coding theory, cryptography, and codes for multiple access schemes. This is followed by a group of papers from a conference session concerned with app- cations. The papers range over various topics from arithmetic coding for data compression and encryption, through image coding, biometrics for authenti- tion, and access to broadcast channels, to photographic signatures for secure identi cation. The third set of papers deals with theoretical aspects of error c- recting coding, including graph and trellis decoding, turbo codes, convolution codes and low complexity soft decision decoding of Reed Solomon codes.".
- catalog contributor b11553345.
- catalog created "1999.".
- catalog date "1999".
- catalog date "1999.".
- catalog dateCopyrighted "1999.".
- catalog description "Applications of Exponential Sums in Communications Theory -- Some Applications of Bounds for Designs to the Cryptography -- Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions -- Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics? -- A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System -- New Self-Dual Codes over GF(5) -- Designs, Intersecting Families, and Weight of Boolean Functions -- Coding Applications in Satellite Communication Systems [Invited Paper] -- A Unified Code -- Enhanced Image Coding for Noisy Channels -- Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System -- An Encoding Scheme for Dual Level Access to Broadcasting Networks -- Photograph Signatures for the Protection of Identification Documents -- An Overview of the Isoperimetric Method in Coding Theory (Extended Abstract) [Invited Paper] -- ".
- catalog description "Includes bibliographical references and index.".
- catalog description "Rectangular Basis of a Linear Code -- Graph Decoding of Array Error-Correcting Codes -- Catastrophicity Test for Time-Varying Convolutional Encoders -- Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes -- On Efficient Decoding of Alternant Codes over a Commutative Ring? -- Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes -- Advanced Encryption Standard (AES) - An Update [Invited Paper] -- The Piling-Up Lemma and Dependent Random Variables -- A Cryptographic Application of Weil Descent -- Edit Probability Correlation Attack on the Bilateral Stop/Go Generator -- Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems (Extended Abstract) -- On the Combined Fermat/Lucas Probable Prime Test? -- On the Cryptanalysis of Nonlinear Sequences [Invited Paper] -- Securing Aeronautical Telecommunications [Invited Paper] -- ".
- catalog description "Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography (Extended Abstract) -- Delegated Decryption -- Fast and Space-Efficient Adaptive Arithmetic Coding? -- Robust Protocol for Generating Shared RSA Parameters -- Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes -- Weaknesses in Shared RSA Key Generation Protocols -- Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.".
- catalog description "The IMA conferences onCryptographyandCoding arenotonly a blend of these two aspects of information theory, but a blend of mathematics and engineering and of theoretical results and applications. The papers in this book show that the1999conferencewasnoexception. Indeed,weagainsawthemathematics- derlyingcryptographyanderrorcorrectingcodingbeing appliedto otheraspects ofcommunications,andwe alsosawclassicalmathematicalconcepts nding new applications in communications theory. As usual the conference was held at the Royal Agricultural College, Cirencester, shortly before Christmas - this time 20-22 December 1999. The papers appear in this book in the order in which they were presented, grouped into sessions,eachsessionbeginning with an invited paper. Theseinvited papers were intended to re?ect the invitees’ views on the future of their subject - or more accurately where they intended to take it. Indeed the focus of the conf- encewas thefutureofcryptographyandcoding as seenthroughtheeyes ofyoung researchers. The r st group of papers is concerned with mathematical bounds, concepts, and constructions that form a common thread running through error corre- ing coding theory, cryptography, and codes for multiple access schemes. This is followed by a group of papers from a conference session concerned with app- cations. The papers range over various topics from arithmetic coding for data compression and encryption, through image coding, biometrics for authenti- tion, and access to broadcast channels, to photographic signatures for secure identi cation. The third set of papers deals with theoretical aspects of error c- recting coding, including graph and trellis decoding, turbo codes, convolution codes and low complexity soft decision decoding of Reed Solomon codes.".
- catalog extent "ix, 312 p. :".
- catalog identifier "354066887X (softcover : acid-free paper)".
- catalog isPartOf "Lecture notes in computer science ; 1746".
- catalog issued "1999".
- catalog issued "1999.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "003/.54 21".
- catalog subject "Coding theory Congresses.".
- catalog subject "Coding theory.".
- catalog subject "Computational complexity.".
- catalog subject "Computer Communication Networks.".
- catalog subject "Computer science.".
- catalog subject "Cryptography Congresses.".
- catalog subject "Data encryption (Computer science).".
- catalog subject "QA268 .C76 2000".
- catalog tableOfContents "Applications of Exponential Sums in Communications Theory -- Some Applications of Bounds for Designs to the Cryptography -- Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions -- Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics? -- A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System -- New Self-Dual Codes over GF(5) -- Designs, Intersecting Families, and Weight of Boolean Functions -- Coding Applications in Satellite Communication Systems [Invited Paper] -- A Unified Code -- Enhanced Image Coding for Noisy Channels -- Perfectly Secure Authorization and Passive Identification for an Error Tolerant Biometric System -- An Encoding Scheme for Dual Level Access to Broadcasting Networks -- Photograph Signatures for the Protection of Identification Documents -- An Overview of the Isoperimetric Method in Coding Theory (Extended Abstract) [Invited Paper] -- ".
- catalog tableOfContents "Rectangular Basis of a Linear Code -- Graph Decoding of Array Error-Correcting Codes -- Catastrophicity Test for Time-Varying Convolutional Encoders -- Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes -- On Efficient Decoding of Alternant Codes over a Commutative Ring? -- Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes -- Advanced Encryption Standard (AES) - An Update [Invited Paper] -- The Piling-Up Lemma and Dependent Random Variables -- A Cryptographic Application of Weil Descent -- Edit Probability Correlation Attack on the Bilateral Stop/Go Generator -- Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems (Extended Abstract) -- On the Combined Fermat/Lucas Probable Prime Test? -- On the Cryptanalysis of Nonlinear Sequences [Invited Paper] -- Securing Aeronautical Telecommunications [Invited Paper] -- ".
- catalog tableOfContents "Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography (Extended Abstract) -- Delegated Decryption -- Fast and Space-Efficient Adaptive Arithmetic Coding? -- Robust Protocol for Generating Shared RSA Parameters -- Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes -- Weaknesses in Shared RSA Key Generation Protocols -- Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison.".
- catalog title "Cryptography and coding : 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 : proceedings / Michael Walker (ed.).".
- catalog type "text".