Amazon cover image
Image from Amazon.com
Image from Google Jackets

Coding, cryptography, and combinatorics

By: Contributor(s): Material type: TextTextLanguage: English Series: Progress in computer science and applied logic ; 23Publication details: Boston Birkhauser Verlag 2004Description: viii, 405 illISBN:
  • 3764324295 (HB)
Subject(s):
Contents:
On the Secondary Constructions of Resilient and Bent Functions.- Adaptive Recursive MLD Algorithm Based on Parallel Concatenation Decomposition for Binary Linear Codes.- Modularity of Asymptotically Optimal Towers of Function Fields.- A New Correlation Attack on LFSR Sequences with High Error Tolerance.- LDPC Codes: An Introduction.- The New Implementation Schemes of the TTM Cryptosystem Are Not Secure.- The Capacity Region of Broadcast Networks with Two Receivers.- Constructions of Nonbinary Codes Correcting t- Symmetric Errors and Detecting All Unidirectional Errors: Magnitude Error Criterion.- On the Propagation Criterion of Boolean Functions.- On Certain Equations over Finite Fields and Cross-Correlations of m-Sequences.- A Polly Cracker System Based on Satisfiability.- Combinatorially Designed LDPC Codes Using Zech Logarithms and Congruential Sequences.- New Constructions of Constant-Weight Codes.- Good Self-Dual Quasi-Cyclic Codes over Fq, q Odd.- Linear Complexity and k-Error Linear Complexity for pn-Periodic Sequences.- HFE and BDDs: A Practical Attempt at Cryptanalysis.- Digital Nets and Coding Theory.- Constructive Asymptotic Codes with an Improvement on the Tsfasman-Vlá,dut-Zink and Xing Bounds.- Malleability Attacks on Multi-Party Key Agreement Protocols.- Combinatorial Tableaux in Isoperimetry.- On the Error Exponents of Reliability-Order-Based Decoding Algorithms for Linear Block Codes.- A Construction of Authentication Codes with Secrecy.- Selection Method of Test Patterns in Soft-Input and Output Iterative Bounded Distance Decoding Algorithm.- Deletion Correcting Using Generalised Reed-Solomon Codes.- A Note on the Linear Complexity Profile of the Discrete Logarithm in Finite Fields.- Speeding Up RSA and Elliptic Curve Systems by Choosing SuitableModuli.- Security Analysis of Three Oblivious Transfer Protocols.- An Improved Identification Scheme.
Summary: The book is of interest for postgraduate students and researchers in mathematics, computer science, information theory and electrical engineering.
Item type: BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified Status Date due Barcode
IMSc Library 681:519.1(082)“2004”FEN (Browse shelf(Opens below)) Available 51996

Includes bibliography (p. 405) and references.

On the Secondary Constructions of Resilient and Bent Functions.- Adaptive Recursive MLD Algorithm Based on Parallel Concatenation Decomposition for Binary Linear Codes.- Modularity of Asymptotically Optimal Towers of Function Fields.- A New Correlation Attack on LFSR Sequences with High Error Tolerance.- LDPC Codes: An Introduction.- The New Implementation Schemes of the TTM Cryptosystem Are Not Secure.- The Capacity Region of Broadcast Networks with Two Receivers.- Constructions of Nonbinary Codes Correcting t- Symmetric Errors and Detecting All Unidirectional Errors: Magnitude Error Criterion.- On the Propagation Criterion of Boolean Functions.- On Certain Equations over Finite Fields and Cross-Correlations of m-Sequences.- A Polly Cracker System Based on Satisfiability.- Combinatorially Designed LDPC Codes Using Zech Logarithms and Congruential Sequences.- New Constructions of Constant-Weight Codes.- Good Self-Dual Quasi-Cyclic Codes over Fq, q Odd.- Linear Complexity and k-Error Linear Complexity for pn-Periodic Sequences.- HFE and BDDs: A Practical Attempt at Cryptanalysis.- Digital Nets and Coding Theory.- Constructive Asymptotic Codes with an Improvement on the Tsfasman-Vlá,dut-Zink and Xing Bounds.- Malleability Attacks on Multi-Party Key Agreement Protocols.- Combinatorial Tableaux in Isoperimetry.- On the Error Exponents of Reliability-Order-Based Decoding Algorithms for Linear Block Codes.- A Construction of Authentication Codes with Secrecy.- Selection Method of Test Patterns in Soft-Input and Output Iterative Bounded Distance Decoding Algorithm.- Deletion Correcting Using Generalised Reed-Solomon Codes.- A Note on the Linear Complexity Profile of the Discrete Logarithm in Finite Fields.- Speeding Up RSA and Elliptic Curve Systems by Choosing SuitableModuli.- Security Analysis of Three Oblivious Transfer Protocols.- An Improved Identification Scheme.

The book is of interest for postgraduate students and researchers in mathematics, computer science, information theory and electrical engineering.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India