Amazon cover image
Image from Amazon.com

Coding and cryptology : proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 / edited by Yongqing Li [and others].

By: Contributor(s): Material type: TextTextSeries: Series on coding theory and cryptologyPublication details: Singapore ; London : World Scientific, 2008.Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789812832245
  • 9812832246
Subject(s): Genre/Form: DDC classification:
  • 003.54 23
LOC classification:
  • QA268
Online resources:
Contents:
Fuzzy Identity-based Encryption: New and Efficient Schemes / J. Baek, W. Susilo and J. Zhou -- A Functional View of Upper Bounds on Codes / A. Barg and D. Nogin -- A Method of Construction of Balanced Functions with Optimum Algebraic Immunity / C. Carlet -- Enumeration of a Class of Sequences Generated by Inversions / A. Cesemlioglu, W. Meidl and A. Topuzoglu -- A Critical Look at Cryptographic Hash Function Literature / S. Contini, R. Steinfeld, J. Pieprzyk and K. Matusiewicz -- Scalable Optimal Test Patterns for Crosstalk-induced Faults on Deep Submicron Global Interconnects / Y.M. Chee and C.J. Colbourn -- An Improved Distinguisher for Dragon / J.Y. Cho and J. Pieprzyk.
Summary: Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks. The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Title from PDF title page (viewed on Apr. 3, 2013).

Includes bibliographical references and index.

Fuzzy Identity-based Encryption: New and Efficient Schemes / J. Baek, W. Susilo and J. Zhou -- A Functional View of Upper Bounds on Codes / A. Barg and D. Nogin -- A Method of Construction of Balanced Functions with Optimum Algebraic Immunity / C. Carlet -- Enumeration of a Class of Sequences Generated by Inversions / A. Cesemlioglu, W. Meidl and A. Topuzoglu -- A Critical Look at Cryptographic Hash Function Literature / S. Contini, R. Steinfeld, J. Pieprzyk and K. Matusiewicz -- Scalable Optimal Test Patterns for Crosstalk-induced Faults on Deep Submicron Global Interconnects / Y.M. Chee and C.J. Colbourn -- An Improved Distinguisher for Dragon / J.Y. Cho and J. Pieprzyk.

Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks. The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library