Coding and cryptology: proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
World Scientific
2008
|
Schriftenreihe: | Series on coding theory and cryptology
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from PDF title page (viewed on Apr. 3, 2013) Includes bibliographical references and index Fuzzy Identity-based Encryption: New and Efficient Schemes - J. Baek, W. Susilo and J. Zhou -- - A Functional View of Upper Bounds on Codes - A. Barg and D. Nogin -- - A Method of Construction of Balanced Functions with Optimum Algebraic Immunity - C. Carlet -- - Enumeration of a Class of Sequences Generated by Inversions - A. Cesemlioglu, W. Meidl and A. Topuzoglu -- - A Critical Look at Cryptographic Hash Function Literature - S. Contini, R. Steinfeld, J. Pieprzyk and K. Matusiewicz -- - Scalable Optimal Test Patterns for Crosstalk-induced Faults on Deep Submicron Global Interconnects - Y. M. Chee and C. J. Colbourn -- - An Improved Distinguisher for Dragon - J. Y. Cho and J. Pieprzyk Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks. The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9789812832238 9789812832245 9812832238 9812832246 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043157914 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2008 |||| o||u| ||||||eng d | ||
020 | |a 9789812832238 |9 978-981-283-223-8 | ||
020 | |a 9789812832245 |c electronic bk. |9 978-981-283-224-5 | ||
020 | |a 9812832238 |9 981-283-223-8 | ||
020 | |a 9812832246 |c electronic bk. |9 981-283-224-6 | ||
035 | |a (OCoLC)835162259 | ||
035 | |a (DE-599)BVBBV043157914 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 003.54 |2 23 | |
110 | 2 | |a International Workshop on Coding and Cryptology < 2007, Wuyi Mountain, China> |e Verfasser |4 aut | |
245 | 1 | 0 | |a Coding and cryptology |b proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 |c edited by Yongqing Li ... [et al.] |
264 | 1 | |a Singapore |b World Scientific |c 2008 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Series on coding theory and cryptology | |
500 | |a Title from PDF title page (viewed on Apr. 3, 2013) | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Fuzzy Identity-based Encryption: New and Efficient Schemes - J. Baek, W. Susilo and J. Zhou -- - A Functional View of Upper Bounds on Codes - A. Barg and D. Nogin -- - A Method of Construction of Balanced Functions with Optimum Algebraic Immunity - C. Carlet -- - Enumeration of a Class of Sequences Generated by Inversions - A. Cesemlioglu, W. Meidl and A. Topuzoglu -- - A Critical Look at Cryptographic Hash Function Literature - S. Contini, R. Steinfeld, J. Pieprzyk and K. Matusiewicz -- - Scalable Optimal Test Patterns for Crosstalk-induced Faults on Deep Submicron Global Interconnects - Y. M. Chee and C. J. Colbourn -- - An Improved Distinguisher for Dragon - J. Y. Cho and J. Pieprzyk | ||
500 | |a Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks. The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys | ||
650 | 7 | |a COMPUTERS / Information Theory |2 bisacsh | |
650 | 4 | |a Coding theory |v Congresses | |
650 | 4 | |a Cryptography |v Congresses | |
650 | 4 | |a Number theory |v Congresses | |
650 | 4 | |a Computer security |v Congresses | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Li, Yongqing |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521178 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028582105 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521178 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521178 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175625076867072 |
---|---|
any_adam_object | |
author_corporate | International Workshop on Coding and Cryptology < 2007, Wuyi Mountain, China> |
author_corporate_role | aut |
author_facet | International Workshop on Coding and Cryptology < 2007, Wuyi Mountain, China> |
author_sort | International Workshop on Coding and Cryptology < 2007, Wuyi Mountain, China> |
building | Verbundindex |
bvnumber | BV043157914 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)835162259 (DE-599)BVBBV043157914 |
dewey-full | 003.54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 003 - Systems |
dewey-raw | 003.54 |
dewey-search | 003.54 |
dewey-sort | 13.54 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04076nmm a2200493zc 4500</leader><controlfield tag="001">BV043157914</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812832238</subfield><subfield code="9">978-981-283-223-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812832245</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-981-283-224-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812832238</subfield><subfield code="9">981-283-223-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812832246</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">981-283-224-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)835162259</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043157914</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">003.54</subfield><subfield code="2">23</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">International Workshop on Coding and Cryptology < 2007, Wuyi Mountain, China></subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Coding and cryptology</subfield><subfield code="b">proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007</subfield><subfield code="c">edited by Yongqing Li ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">World Scientific</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Series on coding theory and cryptology</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from PDF title page (viewed on Apr. 3, 2013)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Fuzzy Identity-based Encryption: New and Efficient Schemes - J. Baek, W. Susilo and J. Zhou -- - A Functional View of Upper Bounds on Codes - A. Barg and D. Nogin -- - A Method of Construction of Balanced Functions with Optimum Algebraic Immunity - C. Carlet -- - Enumeration of a Class of Sequences Generated by Inversions - A. Cesemlioglu, W. Meidl and A. Topuzoglu -- - A Critical Look at Cryptographic Hash Function Literature - S. Contini, R. Steinfeld, J. Pieprzyk and K. Matusiewicz -- - Scalable Optimal Test Patterns for Crosstalk-induced Faults on Deep Submicron Global Interconnects - Y. M. Chee and C. J. Colbourn -- - An Improved Distinguisher for Dragon - J. Y. Cho and J. Pieprzyk</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks. The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number theory</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Yongqing</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521178</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028582105</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521178</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521178</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043157914 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:15Z |
institution | BVB |
isbn | 9789812832238 9789812832245 9812832238 9812832246 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028582105 |
oclc_num | 835162259 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | World Scientific |
record_format | marc |
series2 | Series on coding theory and cryptology |
spelling | International Workshop on Coding and Cryptology < 2007, Wuyi Mountain, China> Verfasser aut Coding and cryptology proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 edited by Yongqing Li ... [et al.] Singapore World Scientific 2008 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Series on coding theory and cryptology Title from PDF title page (viewed on Apr. 3, 2013) Includes bibliographical references and index Fuzzy Identity-based Encryption: New and Efficient Schemes - J. Baek, W. Susilo and J. Zhou -- - A Functional View of Upper Bounds on Codes - A. Barg and D. Nogin -- - A Method of Construction of Balanced Functions with Optimum Algebraic Immunity - C. Carlet -- - Enumeration of a Class of Sequences Generated by Inversions - A. Cesemlioglu, W. Meidl and A. Topuzoglu -- - A Critical Look at Cryptographic Hash Function Literature - S. Contini, R. Steinfeld, J. Pieprzyk and K. Matusiewicz -- - Scalable Optimal Test Patterns for Crosstalk-induced Faults on Deep Submicron Global Interconnects - Y. M. Chee and C. J. Colbourn -- - An Improved Distinguisher for Dragon - J. Y. Cho and J. Pieprzyk Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks. The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys COMPUTERS / Information Theory bisacsh Coding theory Congresses Cryptography Congresses Number theory Congresses Computer security Congresses (DE-588)1071861417 Konferenzschrift gnd-content Li, Yongqing Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521178 Aggregator Volltext |
spellingShingle | Coding and cryptology proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 COMPUTERS / Information Theory bisacsh Coding theory Congresses Cryptography Congresses Number theory Congresses Computer security Congresses |
subject_GND | (DE-588)1071861417 |
title | Coding and cryptology proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 |
title_auth | Coding and cryptology proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 |
title_exact_search | Coding and cryptology proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 |
title_full | Coding and cryptology proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 edited by Yongqing Li ... [et al.] |
title_fullStr | Coding and cryptology proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 edited by Yongqing Li ... [et al.] |
title_full_unstemmed | Coding and cryptology proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 edited by Yongqing Li ... [et al.] |
title_short | Coding and cryptology |
title_sort | coding and cryptology proceedings of the international workshop wuyi mountain fujian china 11 15 june 2007 |
title_sub | proceedings of the international workshop, Wuyi Mountain, Fujian, China 11-15 June 2007 |
topic | COMPUTERS / Information Theory bisacsh Coding theory Congresses Cryptography Congresses Number theory Congresses Computer security Congresses |
topic_facet | COMPUTERS / Information Theory Coding theory Congresses Cryptography Congresses Number theory Congresses Computer security Congresses Konferenzschrift |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=521178 |
work_keys_str_mv | AT internationalworkshoponcodingandcryptology2007wuyimountainchina codingandcryptologyproceedingsoftheinternationalworkshopwuyimountainfujianchina1115june2007 AT liyongqing codingandcryptologyproceedingsoftheinternationalworkshopwuyimountainfujianchina1115june2007 |