000 05477cam a2200649Mi 4500
001 ocn326703768
003 OCoLC
005 20200626104335.0
006 m o d
007 cr unu---|||||
008 951109s1995 nyua ob 100 0 eng d
040 _aSCPER
_beng
_epn
_cCUSER
_dOCLCQ
_dNLGGC
_dOCLCO
_dGW5XE
_dOCLCF
_dITD
_dOCLCO
_dOCLCQ
_dI9W
_dUA@
_dNUI
_dOCL
_dOCLCO
_dOCLCQ
_dOCLCA
_dUAB
_dESU
_dVT2
_dOCLCQ
_dCEF
_dMERER
_dOCLCQ
_dCANPU
_dOCLCQ
_dOL$
_dOCLCQ
_dLEAUB
_dAU@
_dOCLCQ
_dKIJ
019 _a150397874
_a868639170
_a990536482
_a993773150
_a1005797455
_a1006411998
_a1009330173
_a1012877178
_a1014450806
_a1020032447
_a1036779432
_a1038495374
_a1039704614
_a1044308623
_a1044487321
_a1056391582
_a1058906806
_a1073039509
_a1078841407
_a1081200047
_a1086532518
_a1119463039
020 _a9783540492801
_q(electronic bk.)
020 _a3540492801
_q(electronic bk.)
020 _z3540606939
020 _z9783540606932
024 7 _a10.1007/3-540-60693-9
_2doi
029 1 _aAU@
_b000051701087
029 1 _aNLGGC
_b296869198
029 1 _aNZ1
_b14996704
029 1 _aNZ1
_b15299884
035 _a(OCoLC)326703768
_z(OCoLC)150397874
_z(OCoLC)868639170
_z(OCoLC)990536482
_z(OCoLC)993773150
_z(OCoLC)1005797455
_z(OCoLC)1006411998
_z(OCoLC)1009330173
_z(OCoLC)1012877178
_z(OCoLC)1014450806
_z(OCoLC)1020032447
_z(OCoLC)1036779432
_z(OCoLC)1038495374
_z(OCoLC)1039704614
_z(OCoLC)1044308623
_z(OCoLC)1044487321
_z(OCoLC)1056391582
_z(OCoLC)1058906806
_z(OCoLC)1073039509
_z(OCoLC)1078841407
_z(OCoLC)1081200047
_z(OCoLC)1086532518
_z(OCoLC)1119463039
050 4 _aQA268
_b.C76 1995
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUY
_2thema
072 7 _aUYA
_2thema
082 0 4 _a003/.54
_220
084 _a54.62
_2bcl
049 _aMAIN
245 0 0 _aCryptography and coding :
_b5th IMA conference, Cirencester, UK, December 18-20, 1995 : proceedings /
_cColin Boyd, ed.
260 _aBerlin ;
_aNew York :
_bSpringer,
_c©1995.
300 _a1 online resource (ix, 291 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture notes in computer science ;
_v1025
490 _aSerienbezeichnung
504 _aIncludes bibliographical references.
520 _aThis book constitutes the refereed proceedings of the 5th IMA Conference on Cryptography and Coding, held in Cirencester, UK in December 1995. The volume presents 22 full revised papers selected from 48 submissions together with five invited full papers and three abstracts on the mathematical theory and practice of cryptography and coding; continuing advances in these strongly related areas are crucial for the security and reliability of data communication, processing, and storage. Among the topics addressed are linear codes, error-correcting codes, decoding, key distribution, authentication, hash functions, block ciphers, cryptanalysis, and electronic cash.
505 0 _aDesign choices and security implications in implementing Diffie-Hellman key agreement -- A broadcast key distribution scheme based on block designs -- Minimal supports in linear codes -- Sequential decoding for a subcode of Reed Solomon Codes -- Linear Span analysis of a set of periodic sequence generators -- Minimal weight k-SR representations -- The main conjecture for MDS codes -- Some decoding applications of minimal realization -- The synthesis of perfect sequences -- Computation of low-weight parity checks for correlation attacks on stream ciphers -- A storage complexity based analogue of Maurer key establishment using public channels -- Soft decision decoding of Reed Solomon codes using the Dorsch algorithm -- Good codes based on very sparse matrices -- Quantum cryptography: Protecting our future networks with quantum mechanics -- Prepaid electronic cheques using public-key certificates -- How traveling salespersons prove their identity -- An elliptic curve analogue of McCurley's key agreement scheme -- Multi-dimensional ring TCM codes for fading channels -- Authentication codes: An area where coding and cryptology meet -- Efficient generation of binary words of given weight -- Distribution of recurrent sequences modulo prime powers -- On-line secret sharing -- Church-Rosser codes -- A new algorithm for finding minimum-weight words in large linear codes -- Coding and cryptography for speech and vision -- Some constructions of generalised concatenated codes based on unit memory codes -- A note on the hash function of Tillich and Zémor -- Cryptanalysis of Harari's identification scheme -- Analysis of sequence segment keying as a method of CDMA transmission -- Constructions for variable-length error-correcting codes.
650 0 _aCoding theory
_vCongresses.
_915981
650 0 _aCryptography
_vCongresses.
_914592
650 7 _aCoding theory.
_2fast
_0(OCoLC)fst00866237
_91927
650 7 _aCryptography.
_2fast
_0(OCoLC)fst00884552
_934119
650 1 7 _aCryptografie.
_2gtt
_915165
655 4 _aElectronic books.
_9396
655 7 _aConference papers and proceedings.
_2fast
_0(OCoLC)fst01423772
_96065
655 7 _aCongressen (vorm)
_2gtt
_98970
700 1 _aBoyd, Colin.
_920933
776 0 8 _iPrint version:
_z3540606939
_w(DLC) 95047128
_w(OCoLC)33820176
830 0 _aLecture notes in computer science ;
_v1025.
_934120
856 4 0 _uhttps://link-springer-com.libraryproxy.ist.ac.at/book/10.1007/3-540-60693-9
994 _a92
_bATIST
999 _c379509
_d379509