Cargando…

Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected Papers /

Thisvolumecontainsrefereedpapersdevotedtocodingandcryptography.These papers arethe full versionsof a selectionof the best extended abstractsaccepted for presentation at the International Workshop on Coding and Cryptography (WCC 2005) held in Bergen, Norway, March 14-18, 2005. Each of the 118 - tende...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Ytrehus, Øyvind (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Security and Cryptology ; 3969
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Second Support Weights for Binary Self-dual Codes
  • On Codes Correcting Symmetric Rank Errors
  • Error and Erasure Correction of Interleaved Reed-Solomon Codes
  • A Welch-Berlekamp Like Algorithm for Decoding Gabidulin Codes
  • On the Weights of Binary Irreducible Cyclic Codes
  • 3-Designs from Z 4-Goethals-Like Codes and Variants of Cyclotomic Polynomials
  • Space-Time Code Designs Based on the Generalized Binary Rank Criterion with Applications to Cooperative Diversity
  • Geometric Conditions for the Extendability of Ternary Linear Codes
  • On the Design of Codes for DNA Computing
  • Open Problems Related to Algebraic Attacks on Stream Ciphers
  • On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two
  • Interpolation of Functions Related to the Integer Factoring Problem
  • On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography
  • Finding Good Differential Patterns for Attacks on SHA-1
  • Extending Gibson's Attacks on the GPT Cryptosystem
  • Reduction of Conjugacy Problem in Braid Groups, Using Two Garside Structures
  • A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy
  • Multi-Dimensional Hash Chains and Application to Micropayment Schemes
  • On the Affine Transformations of HFE-Cryptosystems and Systems with Branches
  • Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
  • RSA-Based Secret Handshakes
  • On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes
  • ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps
  • A New Public-Key Cryptosystem Based on the Problem of Reconstructing p-Polynomials
  • On the Wagner-Magyarik Cryptosystem
  • Constructions of Complementary Sequences for Power-Controlled OFDM Transmission
  • A Novel Method for Constructing Almost Perfect Polyphase Sequences
  • Linear Filtering of Nonlinear Shift-Register Sequences
  • Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation
  • Frequency/Time Hopping Sequences with Large Linear Complexities
  • One and Two-Variable Interlace Polynomials: A Spectral Interpretation
  • Improved Bounds on Weil Sums over Galois Rings and Homogeneous Weights
  • Locally Invertible Multivariate Polynomial Matrices.