Cryptography and Coding (Record no. 187847)

MARC details
000 -LEADER
fixed length control field 06458nam a22006855i 4500
001 - CONTROL NUMBER
control field 978-3-540-45325-3
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423132439.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121227s2001 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540453253
-- 978-3-540-45325-3
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/3-540-45325-3
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA268
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.824
Edition number 23
245 10 - TITLE STATEMENT
Title Cryptography and Coding
Medium [electronic resource] :
Remainder of title 8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings /
Statement of responsibility, etc edited by Bahram Honary.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2001.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2001.
300 ## - PHYSICAL DESCRIPTION
Extent IX, 419 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume number/sequential designation 2260
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note A Statistical Decoding Algorithm for General Linear Block Codes -- On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory -- The Complete Weight Enumerator for Codes over M nxs(F q) -- Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem -- A Simple Soft-Input/Soft-Output Decoder for Hamming Codes -- A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks -- Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs -- The Exact Security of ECIES in the Generic Group Model -- A New Ultrafast Stream Cipher Design: COS Ciphers -- On Rabin-Type Signatures -- Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) -- Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps -- Almost-Certainly Runlength-Limiting Codes -- Weight vs. Magnetization Enumerator for Gallager Codes -- Graph Configurations and Decoding Performance -- A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing -- The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems -- Improvement of the Delsarte Bound for ?-Designs in Finite Polynomial Metric Spaces -- Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding -- The Wide Trail Design Strategy -- Undetachable Threshold Signatures -- Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies -- Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation -- Unconditionally Secure Key Agreement Protocol -- An Efficient Stream Cipher Alpha1 for Mobile and WirelessDevices -- Investigation of Linear Codes Possessing Some Extra Properties -- Statistical Physics of Low Density Parity Check Error Correcting Codes -- Generating Large Instances of the Gong-Harn Cryptosystem -- Lattice Attacks on RSA-Encrypted IP and TCP -- Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement -- Attacking the Affine Parts of SFLASH -- An Identity Based Encryption Scheme Based on Quadratic Residues -- Another Way of Doing RSA Cryptography in Hardware -- Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers -- A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA -- A New Undeniable Signature Scheme Using Smart Cards -- Non-binary Block Inseparable Errors Control Codes -- Cryptanalysis of Nonlinear Filter Generators with (0, 1)-Metric Viterbi Decoding.
520 ## - SUMMARY, ETC.
Summary, etc The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of “Cryptography and Coding” was both timely and relevant. The theme of this conference was the future of coding and cryptography, which was touched upon in presentations by a number of invited speakers and researchers. The papers that appear in this book include recent research and development in error control coding and cryptography. These start with mathematical bounds, statistical decoding schemes for error correcting codes, and undetected error probabilities and continue with the theoretical aspects of error correction coding such as graph and trellis decoding, multifunctional and multiple access communication systems, low density parity check codes, and iterative decoding. These are followed by some papers on key recovery attack, authentication, stream cipher design, and analysis of ECIES algorithms, and lattice attacks on IP based protocols.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science
General subdivision Mathematics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Discrete mathematics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing
General subdivision Management.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptology.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Theory of Computation.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Discrete Mathematics in Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element IT Operations.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Honary, Bahram.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540430261
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783662177907
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
-- 1611-3349 ;
Volume number/sequential designation 2260
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/3-540-45325-3">https://doi.org/10.1007/3-540-45325-3</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
912 ## -
-- ZDB-2-BAE
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in