Cryptography and coding: 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schriftenreihe: | Lecture Notes in Computer Science
5921 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XI, 494 S. graph. Darst. 235 mm x 155 mm |
ISBN: | 9783642108679 3642108679 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035881321 | ||
003 | DE-604 | ||
005 | 20100915 | ||
007 | t | ||
008 | 091214s2009 d||| |||| 10||| eng d | ||
015 | |a 09N470007 |2 dnb | ||
016 | 7 | |a 997865873 |2 DE-101 | |
020 | |a 9783642108679 |c PB. : EUR 74.90 (freier Pr.), sfr 109.00 (freier Pr.) |9 978-3-642-10867-9 | ||
020 | |a 3642108679 |9 3-642-10867-9 | ||
035 | |a (OCoLC)471803156 | ||
035 | |a (DE-599)DNB997865873 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
050 | 0 | |a QA268 | |
082 | 0 | |a 512 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 580f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Cryptography and coding |b 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings |c Matthew G. Parker (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a XI, 494 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 5921 | |
650 | 4 | |a Coding theory |v Congresses | |
650 | 4 | |a Cryptography |v Congresses | |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Codierungstheorie |0 (DE-588)4139405-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Cirencester |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Codierungstheorie |0 (DE-588)4139405-7 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Parker, Matthew G. |e Sonstige |4 oth | |
711 | 2 | |a International Conference on Cryptography and Coding |n 12 |d 2009 |c Cirencester |j Sonstige |0 (DE-588)16052009-5 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 5921 |w (DE-604)BV000000607 |9 5921 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018738897&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018738897 |
Datensatz im Suchindex
_version_ | 1804140861131325440 |
---|---|
adam_text | TABLE OF CONTENTS CODING THEORY SUBSPACE CODES 1 AZADEH KHALEGHI, DANILO
SILVA, AND FRANK R. KSCHISCHANG ON LINEAR PROGRAMMING DECODING ON A
QUANTIZED ADDITIVE WHITE GAUSSIAN NOISE CHANNEL 22 EIRIK ROSNES CODES AS
MODULES OVER SKEW POLYNOMIAL RINGS 38 DELPHINE BOUCHER AND FELIX ULMER
ON HIGHER WEIGHTS AND CODE EXISTENCE 56 HANS GEORG SCHAATHUN MASS
FORMULA FOR EVEN CODES OVER ZZS 65 KOICHI BETSUMIYA. ROMENA ALMA L.
BETTY, AND AKIHIRO MUNEMASA ON THE CLASSIFICATION OF SELF-DUAL
.Z?^-CODES 78 MASAAKI HARADA AND AKIHIRO MUNEMASA ON LINEAR CODES FROM
MAXIMAL CURVES 91 STEFANIA FANALI SYMMETRIC CRYPTOGRAPHY ON LINEAR
CRYPTANALYSIS WITH MANY LINEAR APPROXIMATIONS 112 BENOIT GERARD AND
JEAN-PIERRE TILLICH BIVIUM AS A MIXED-INTEGER LINEAR PROGRAMMING PROBLEM
133 JULIA BORGHOFF, LARS R. KNUDSEN, AND MATHIAS STOLPE SECURITY OF
CYCLIC DOUBLE BLOCK LENGTH HASH FUNCTIONS 153 EWAN FLEISCHMANN, MICHAEL
GORSKI, AND STEFAN LUCKS ANOTHER GLANCE AT DOUBLE-LENGTH HASHING 176
ONUR OZEN AND MARTIJN STAM GEOMETRIC IDEAS FOR CRYPTOGRAPHIC EQUATION
SOLVING IN EVEN CHARACTERISTIC 202 *SEAN MURPHY BIBLIOGRAFISCHE
INFORMATIONEN HTTP://D-NB.INFO/997865873 DIGITALISIERT DURCH X TABLE OF
CONTENTS SECURITY PROTOCOLS PROVABLY SECURE CODE-BASED THRESHOLD RING
SIGNATURE S 222 LEONARD DALLOT AND DUMIE.N VTIYNAUD A NEW PROTOCOL FOR
THE NEARBY FRIEND PROBLEM 23G SANJIT CHATTERJET : . KORTIY KAMBMA. AND
ALFRED MENEZES DISTRIBUTING THE KEY DISTRIBUTION CENTRE IN SAKAI
KASAHARA BASED SYSTEMS 252 MARTIN GEISLER AND NIYVL P. SMART KEY
PREDISTRIBUTION SCHEMES AND ONE-TIME BROADCAST ENCRYPTION SCHEMES FROM
ALGEBRAIC GEOMETRY CODES 263 HAO CHEN. SAN LING. CARLES PADRO. HUAXIONG
WANG, AND CHAOPING XING ATTRIBUTE-BASED ENCRYPTION SUPPORTING
DIRECT/INDIRECT REVOCATION MODES 278 NUTTAPONG ATTRNPADUNG AND HIDEKI
LINAI CERTIFICATE-FREE ATTRIBUTE AUTHENTICATION 301 DALIA KHADER. LIQUN
CHEN, AND JAMES H. DAVENPORT, ASYMMETRIC CRYPTOGRAPHY COMPARING WITH RSA
326 JULIEN CATHALO, DAVID NACCACHE, AND JEAN-JACQUES QUISQUATER
DOUBLE-EXPONENTIATION IN FACTOR-4 GROUPS AND ITS APPLICATIONS 336 KORAY
KARABINA ORACLE-ASSISTED STATIC DIFFIE-HELLMAN IS EASIER THAN DISCRETE
LOGARITHMS 351 ANTOINE JOUX, REYNOLD LERCIER, DAVID NACCACHE, AND
EMMANUEL THOME AN IMPROVEMENT TO THE GAUDRY-SCHOST ALGORITHM FOR
MULTIDIMENSIONAL DISCRETE LOGARITHM PROBLEMS 368 STEVEN TABLE OF
CONTENTS XI THE RAYLEIGH QUOTIENT OF BENT FUNCTIONS 418 LARS EIRIK
DANIELSEN, MATTHEW G. PARKER, AND PATRICK SOLE SIDE CHANNELS AND
IMPLEMENTATIONS CACHE TIMING ANALYSIS OF LFSR-BASED STREAM CIPHERS 433
GREGOR LEANDER. ERIK ZENNER. AND PHILIP HAWKES OPTIMAL RECOVERY OF
SECRET KEYS FROM WEAK SIDE CHANNEL TRACES 446 WERNER SCHINDLER AND COLIN
D. WALTER PRACTICAL ZERO-KNOWLEDGE PROOFS FOR CIRCUIT EVALUATION 469
ESSAM GHADAFI. NIGEL P. SMART, AND BOGDAN WARINSCHI AUTHOR INDEX 495
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV035881321 |
callnumber-first | Q - Science |
callnumber-label | QA268 |
callnumber-raw | QA268 |
callnumber-search | QA268 |
callnumber-sort | QA 3268 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 580f DAT 465f |
ctrlnum | (OCoLC)471803156 (DE-599)DNB997865873 |
dewey-full | 512 |
dewey-hundreds | 500 - Natural sciences and mathematics |
dewey-ones | 512 - Algebra |
dewey-raw | 512 |
dewey-search | 512 |
dewey-sort | 3512 |
dewey-tens | 510 - Mathematics |
discipline | Informatik Mathematik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02457nam a2200589 cb4500</leader><controlfield tag="001">BV035881321</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100915 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">091214s2009 d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09N470007</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">997865873</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642108679</subfield><subfield code="c">PB. : EUR 74.90 (freier Pr.), sfr 109.00 (freier Pr.)</subfield><subfield code="9">978-3-642-10867-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642108679</subfield><subfield code="9">3-642-10867-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)471803156</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB997865873</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA268</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">512</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 580f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and coding</subfield><subfield code="b">12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings</subfield><subfield code="c">Matthew G. Parker (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 494 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5921</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Cirencester</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Parker, Matthew G.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Conference on Cryptography and Coding</subfield><subfield code="n">12</subfield><subfield code="d">2009</subfield><subfield code="c">Cirencester</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16052009-5</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5921</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5921</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018738897&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018738897</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Cirencester gnd-content |
genre_facet | Konferenzschrift 2009 Cirencester |
id | DE-604.BV035881321 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:06:42Z |
institution | BVB |
institution_GND | (DE-588)16052009-5 |
isbn | 9783642108679 3642108679 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018738897 |
oclc_num | 471803156 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XI, 494 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Cryptography and coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings Matthew G. Parker (ed.) Berlin [u.a.] Springer 2009 XI, 494 S. graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture Notes in Computer Science 5921 Coding theory Congresses Cryptography Congresses Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Codierungstheorie (DE-588)4139405-7 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Cirencester gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Codierungstheorie (DE-588)4139405-7 s Sicherheitsprotokoll (DE-588)4709127-7 s Kryptoanalyse (DE-588)4830502-9 s Parker, Matthew G. Sonstige oth International Conference on Cryptography and Coding 12 2009 Cirencester Sonstige (DE-588)16052009-5 oth Lecture Notes in Computer Science 5921 (DE-604)BV000000607 5921 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018738897&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cryptography and coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings Lecture Notes in Computer Science Coding theory Congresses Cryptography Congresses Sicherheitsprotokoll (DE-588)4709127-7 gnd Codierungstheorie (DE-588)4139405-7 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4709127-7 (DE-588)4139405-7 (DE-588)4830502-9 (DE-588)4033329-2 (DE-588)1071861417 |
title | Cryptography and coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings |
title_auth | Cryptography and coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings |
title_exact_search | Cryptography and coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings |
title_full | Cryptography and coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings Matthew G. Parker (ed.) |
title_fullStr | Cryptography and coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings Matthew G. Parker (ed.) |
title_full_unstemmed | Cryptography and coding 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings Matthew G. Parker (ed.) |
title_short | Cryptography and coding |
title_sort | cryptography and coding 12th ima international conference cryptography and coding 2009 cirencester uk december 15 17 2009 proceedings |
title_sub | 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009 ; proceedings |
topic | Coding theory Congresses Cryptography Congresses Sicherheitsprotokoll (DE-588)4709127-7 gnd Codierungstheorie (DE-588)4139405-7 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Coding theory Congresses Cryptography Congresses Sicherheitsprotokoll Codierungstheorie Kryptoanalyse Kryptologie Konferenzschrift 2009 Cirencester |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018738897&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT parkermatthewg cryptographyandcoding12thimainternationalconferencecryptographyandcoding2009cirencesterukdecember15172009proceedings AT internationalconferenceoncryptographyandcodingcirencester cryptographyandcoding12thimainternationalconferencecryptographyandcoding2009cirencesterukdecember15172009proceedings |