Coding and cryptography :: synergy for a robust communication /
This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The int...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
München :
Oldenbourg Wissenschaftsverlag,
[2013]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and. |
Beschreibung: | 1 online resource (134 pages) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9783486781267 348678126X 348675212X 9783486752120 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn872677913 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 140131t20132013gw a ob 000 0 eng d | ||
040 | |a E7B |b eng |e rda |e pn |c E7B |d N$T |d YDXCP |d OCLCF |d IDEBK |d EBLCP |d DEBSZ |d BTCTA |d OCLCQ |d AGLDB |d MOR |d CCO |d PIFAG |d OCLCA |d ZCU |d MERUC |d OCLCQ |d U3W |d STF |d VTS |d NRAMU |d ICG |d OCLCQ |d INT |d VT2 |d OCLCQ |d WYU |d TKN |d OCLCQ |d DKC |d AU@ |d OCLCQ |d U9X |d AJS |d OCLCQ |d SNK |d OCLCO |d OCLCQ |d DEGRU |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 865330083 |a 961590768 |a 1084349193 | ||
020 | |a 9783486781267 |q (electronic bk.) | ||
020 | |a 348678126X |q (electronic bk.) | ||
020 | |a 348675212X | ||
020 | |a 9783486752120 | ||
020 | |z 9783486752120 | ||
024 | 7 | |a 10.1524/9783486781267 |2 doi | |
035 | |a (OCoLC)872677913 |z (OCoLC)865330083 |z (OCoLC)961590768 |z (OCoLC)1084349193 | ||
050 | 4 | |a QA268 |b .Z58 2013eb | |
072 | 7 | |a TEC |x 009070 |2 bisacsh | |
082 | 7 | |a 621.3 | |
084 | |a ZN 6045 |2 rvk | ||
049 | |a MAIN | ||
100 | 1 | |a Živić, Nataša. | |
245 | 1 | 0 | |a Coding and cryptography : |b synergy for a robust communication / |c Dr.-Ing. habil. Nataša Živić, Universität Siegen. |
264 | 1 | |a München : |b Oldenbourg Wissenschaftsverlag, |c [2013] | |
264 | 4 | |c ©2013 | |
300 | |a 1 online resource (134 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references. | ||
588 | 0 | |a Online resource; title from PDF title page (ebrary, viewed January 31, 2014). | |
505 | 0 | |a Abstract; 1 Introduction; 2 Fundamentals; 2.1 Components of a Transmission System; 2.2 Message Authentication Codes; 2.2.1 General; 2.2.2 Generation using a symmetric Block Cipher; 2.2.3 Generation using a Dedicated Hash Function; 2.2.4 Security Aspects of Message Authentication Codes; 2.2.5 Message Authentication Codes and Digital Signatures; 2.3 Channel Coding; 2.3.1 Reed-Solomon Codes; 2.3.2 Convolutional and Turbo Codes; 2.3.3 Soft Input Soft Output Decoding; 2.3.4 Concatenated Codes; 2.4 Joint Source and Channel Coding; 3 Related Work; 3.1 Channel Coding with Bit Inversion. | |
505 | 8 | |a 3.2 Error tolerant Cryptographic Checksums3.3 Authentication over Noisy Channels; 4 Soft Input Hard Verification; 4.1 Correction by Iterative Bit Inversion; 4.2 Security Aspects of Soft Input Hard Verification; 4.3 Correction Improvement by Interleaving and Feedback; 4.4 Correction by Insertion of Known Bits; 5 Applications of Soft Input Bit Inversion; 5.1 Correction of Reed-Solomon Decoding Errors; 5.2 HARQ IBF Algorithm; 5.3 N-Channel STOP and WAIT Protocol of WiMAX; 5.4 Enhanced Packet Combining over HYBRID-ARQ; 5.5 Error Correcting and Weighted Noise Tolerant Message Authentication Codes. | |
505 | 8 | |a 6 Soft Verification of the Message Authentication Codes6.1 Soft Verification versus Hard Verification; 6.2 Soft Input Soft Verification; 6.3 Calculation of the Threshold; 6.3.1 Probability Distribution Function of the Hamming Distance; 6.3.2 Analysis of the Hamming Distance and the Threshold; 6.3.3 Simulative Specification of the Threshold; 6.4 Verification Gain; 7 Security Aspects of Soft Input Soft Verification; 7.1 Forgery Attacks; 7.1.1 Birthday Paradox for Near Collisions; 7.1.2 Compensation of the Reduced Complexity of a Forgery Attack; 7.2 Wrong Decisions. | |
505 | 8 | |a 7.2.1 Probability of a Wrong Decision7.2.2 Compensation of the Increased Probability of Wrong Decision; 7.3 Total Compensation; 7.4 Selection of the Algorithmic Parameters; 8 Soft Output of Soft Input Soft Verification; 9 Applications of Soft Input Soft Verification; 10 Summary and Future Work; Epilogue; Works Cited; List of Abbreviations. | |
520 | |a This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and. | ||
650 | 0 | |a Coding theory. |0 http://id.loc.gov/authorities/subjects/sh85027654 | |
650 | 0 | |a Cryptography. | |
650 | 6 | |a Cryptographie. | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Mechanical. |2 bisacsh | |
650 | 7 | |a Coding theory |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
758 | |i has work: |a Coding and cryptography (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFBWDXQctF94CKD8M7VFqP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Živic, Nataša. |t Coding and Cryptography : Synergy for a Robust Communication. |d München : De Gruyter, ©2013 |z 9783486752120 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=674485 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a De Gruyter |b DEGR |n 9783486781267 | ||
938 | |a Baker and Taylor |b BTCP |n BK0018088261 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1377173 | ||
938 | |a ebrary |b EBRY |n ebr10829516 | ||
938 | |a EBSCOhost |b EBSC |n 674485 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis26510620 | ||
938 | |a YBP Library Services |b YANK |n 10917835 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn872677913 |
---|---|
_version_ | 1816882263869095936 |
adam_text | |
any_adam_object | |
author | Živić, Nataša |
author_facet | Živić, Nataša |
author_role | |
author_sort | Živić, Nataša |
author_variant | n z nz |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA268 |
callnumber-raw | QA268 .Z58 2013eb |
callnumber-search | QA268 .Z58 2013eb |
callnumber-sort | QA 3268 Z58 42013EB |
callnumber-subject | QA - Mathematics |
classification_rvk | ZN 6045 |
collection | ZDB-4-EBA |
contents | Abstract; 1 Introduction; 2 Fundamentals; 2.1 Components of a Transmission System; 2.2 Message Authentication Codes; 2.2.1 General; 2.2.2 Generation using a symmetric Block Cipher; 2.2.3 Generation using a Dedicated Hash Function; 2.2.4 Security Aspects of Message Authentication Codes; 2.2.5 Message Authentication Codes and Digital Signatures; 2.3 Channel Coding; 2.3.1 Reed-Solomon Codes; 2.3.2 Convolutional and Turbo Codes; 2.3.3 Soft Input Soft Output Decoding; 2.3.4 Concatenated Codes; 2.4 Joint Source and Channel Coding; 3 Related Work; 3.1 Channel Coding with Bit Inversion. 3.2 Error tolerant Cryptographic Checksums3.3 Authentication over Noisy Channels; 4 Soft Input Hard Verification; 4.1 Correction by Iterative Bit Inversion; 4.2 Security Aspects of Soft Input Hard Verification; 4.3 Correction Improvement by Interleaving and Feedback; 4.4 Correction by Insertion of Known Bits; 5 Applications of Soft Input Bit Inversion; 5.1 Correction of Reed-Solomon Decoding Errors; 5.2 HARQ IBF Algorithm; 5.3 N-Channel STOP and WAIT Protocol of WiMAX; 5.4 Enhanced Packet Combining over HYBRID-ARQ; 5.5 Error Correcting and Weighted Noise Tolerant Message Authentication Codes. 6 Soft Verification of the Message Authentication Codes6.1 Soft Verification versus Hard Verification; 6.2 Soft Input Soft Verification; 6.3 Calculation of the Threshold; 6.3.1 Probability Distribution Function of the Hamming Distance; 6.3.2 Analysis of the Hamming Distance and the Threshold; 6.3.3 Simulative Specification of the Threshold; 6.4 Verification Gain; 7 Security Aspects of Soft Input Soft Verification; 7.1 Forgery Attacks; 7.1.1 Birthday Paradox for Near Collisions; 7.1.2 Compensation of the Reduced Complexity of a Forgery Attack; 7.2 Wrong Decisions. 7.2.1 Probability of a Wrong Decision7.2.2 Compensation of the Increased Probability of Wrong Decision; 7.3 Total Compensation; 7.4 Selection of the Algorithmic Parameters; 8 Soft Output of Soft Input Soft Verification; 9 Applications of Soft Input Soft Verification; 10 Summary and Future Work; Epilogue; Works Cited; List of Abbreviations. |
ctrlnum | (OCoLC)872677913 |
dewey-full | 621.3 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.3 |
dewey-search | 621.3 |
dewey-sort | 3621.3 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05519cam a2200661 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn872677913</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">140131t20132013gw a ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">E7B</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">E7B</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCF</subfield><subfield code="d">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">BTCTA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">CCO</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKC</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U9X</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SNK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEGRU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">865330083</subfield><subfield code="a">961590768</subfield><subfield code="a">1084349193</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783486781267</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">348678126X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">348675212X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783486752120</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783486752120</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1524/9783486781267</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)872677913</subfield><subfield code="z">(OCoLC)865330083</subfield><subfield code="z">(OCoLC)961590768</subfield><subfield code="z">(OCoLC)1084349193</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA268</subfield><subfield code="b">.Z58 2013eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">009070</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">621.3</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6045</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Živić, Nataša.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Coding and cryptography :</subfield><subfield code="b">synergy for a robust communication /</subfield><subfield code="c">Dr.-Ing. habil. Nataša Živić, Universität Siegen.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">München :</subfield><subfield code="b">Oldenbourg Wissenschaftsverlag,</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (134 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (ebrary, viewed January 31, 2014).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Abstract; 1 Introduction; 2 Fundamentals; 2.1 Components of a Transmission System; 2.2 Message Authentication Codes; 2.2.1 General; 2.2.2 Generation using a symmetric Block Cipher; 2.2.3 Generation using a Dedicated Hash Function; 2.2.4 Security Aspects of Message Authentication Codes; 2.2.5 Message Authentication Codes and Digital Signatures; 2.3 Channel Coding; 2.3.1 Reed-Solomon Codes; 2.3.2 Convolutional and Turbo Codes; 2.3.3 Soft Input Soft Output Decoding; 2.3.4 Concatenated Codes; 2.4 Joint Source and Channel Coding; 3 Related Work; 3.1 Channel Coding with Bit Inversion.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.2 Error tolerant Cryptographic Checksums3.3 Authentication over Noisy Channels; 4 Soft Input Hard Verification; 4.1 Correction by Iterative Bit Inversion; 4.2 Security Aspects of Soft Input Hard Verification; 4.3 Correction Improvement by Interleaving and Feedback; 4.4 Correction by Insertion of Known Bits; 5 Applications of Soft Input Bit Inversion; 5.1 Correction of Reed-Solomon Decoding Errors; 5.2 HARQ IBF Algorithm; 5.3 N-Channel STOP and WAIT Protocol of WiMAX; 5.4 Enhanced Packet Combining over HYBRID-ARQ; 5.5 Error Correcting and Weighted Noise Tolerant Message Authentication Codes.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">6 Soft Verification of the Message Authentication Codes6.1 Soft Verification versus Hard Verification; 6.2 Soft Input Soft Verification; 6.3 Calculation of the Threshold; 6.3.1 Probability Distribution Function of the Hamming Distance; 6.3.2 Analysis of the Hamming Distance and the Threshold; 6.3.3 Simulative Specification of the Threshold; 6.4 Verification Gain; 7 Security Aspects of Soft Input Soft Verification; 7.1 Forgery Attacks; 7.1.1 Birthday Paradox for Near Collisions; 7.1.2 Compensation of the Reduced Complexity of a Forgery Attack; 7.2 Wrong Decisions.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7.2.1 Probability of a Wrong Decision7.2.2 Compensation of the Increased Probability of Wrong Decision; 7.3 Total Compensation; 7.4 Selection of the Algorithmic Parameters; 8 Soft Output of Soft Input Soft Verification; 9 Applications of Soft Input Soft Verification; 10 Summary and Future Work; Epilogue; Works Cited; List of Abbreviations.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85027654</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cryptographie.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Mechanical.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Coding theory</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Coding and cryptography (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFBWDXQctF94CKD8M7VFqP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Živic, Nataša.</subfield><subfield code="t">Coding and Cryptography : Synergy for a Robust Communication.</subfield><subfield code="d">München : De Gruyter, ©2013</subfield><subfield code="z">9783486752120</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=674485</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9783486781267</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker and Taylor</subfield><subfield code="b">BTCP</subfield><subfield code="n">BK0018088261</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1377173</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10829516</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">674485</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis26510620</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10917835</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn872677913 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:25:50Z |
institution | BVB |
isbn | 9783486781267 348678126X 348675212X 9783486752120 |
language | English |
oclc_num | 872677913 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (134 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Oldenbourg Wissenschaftsverlag, |
record_format | marc |
spelling | Živić, Nataša. Coding and cryptography : synergy for a robust communication / Dr.-Ing. habil. Nataša Živić, Universität Siegen. München : Oldenbourg Wissenschaftsverlag, [2013] ©2013 1 online resource (134 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references. Online resource; title from PDF title page (ebrary, viewed January 31, 2014). Abstract; 1 Introduction; 2 Fundamentals; 2.1 Components of a Transmission System; 2.2 Message Authentication Codes; 2.2.1 General; 2.2.2 Generation using a symmetric Block Cipher; 2.2.3 Generation using a Dedicated Hash Function; 2.2.4 Security Aspects of Message Authentication Codes; 2.2.5 Message Authentication Codes and Digital Signatures; 2.3 Channel Coding; 2.3.1 Reed-Solomon Codes; 2.3.2 Convolutional and Turbo Codes; 2.3.3 Soft Input Soft Output Decoding; 2.3.4 Concatenated Codes; 2.4 Joint Source and Channel Coding; 3 Related Work; 3.1 Channel Coding with Bit Inversion. 3.2 Error tolerant Cryptographic Checksums3.3 Authentication over Noisy Channels; 4 Soft Input Hard Verification; 4.1 Correction by Iterative Bit Inversion; 4.2 Security Aspects of Soft Input Hard Verification; 4.3 Correction Improvement by Interleaving and Feedback; 4.4 Correction by Insertion of Known Bits; 5 Applications of Soft Input Bit Inversion; 5.1 Correction of Reed-Solomon Decoding Errors; 5.2 HARQ IBF Algorithm; 5.3 N-Channel STOP and WAIT Protocol of WiMAX; 5.4 Enhanced Packet Combining over HYBRID-ARQ; 5.5 Error Correcting and Weighted Noise Tolerant Message Authentication Codes. 6 Soft Verification of the Message Authentication Codes6.1 Soft Verification versus Hard Verification; 6.2 Soft Input Soft Verification; 6.3 Calculation of the Threshold; 6.3.1 Probability Distribution Function of the Hamming Distance; 6.3.2 Analysis of the Hamming Distance and the Threshold; 6.3.3 Simulative Specification of the Threshold; 6.4 Verification Gain; 7 Security Aspects of Soft Input Soft Verification; 7.1 Forgery Attacks; 7.1.1 Birthday Paradox for Near Collisions; 7.1.2 Compensation of the Reduced Complexity of a Forgery Attack; 7.2 Wrong Decisions. 7.2.1 Probability of a Wrong Decision7.2.2 Compensation of the Increased Probability of Wrong Decision; 7.3 Total Compensation; 7.4 Selection of the Algorithmic Parameters; 8 Soft Output of Soft Input Soft Verification; 9 Applications of Soft Input Soft Verification; 10 Summary and Future Work; Epilogue; Works Cited; List of Abbreviations. This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding aspects is very interesting, as the usage of cryptography will be common use, even in industrial applications. The book is based on new developments of coding and cryptography, which use real numbers to express reliability values of bits instead of binary values 0 and. Coding theory. http://id.loc.gov/authorities/subjects/sh85027654 Cryptography. Cryptographie. TECHNOLOGY & ENGINEERING Mechanical. bisacsh Coding theory fast Cryptography fast has work: Coding and cryptography (Text) https://id.oclc.org/worldcat/entity/E39PCFBWDXQctF94CKD8M7VFqP https://id.oclc.org/worldcat/ontology/hasWork Print version: Živic, Nataša. Coding and Cryptography : Synergy for a Robust Communication. München : De Gruyter, ©2013 9783486752120 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=674485 Volltext |
spellingShingle | Živić, Nataša Coding and cryptography : synergy for a robust communication / Abstract; 1 Introduction; 2 Fundamentals; 2.1 Components of a Transmission System; 2.2 Message Authentication Codes; 2.2.1 General; 2.2.2 Generation using a symmetric Block Cipher; 2.2.3 Generation using a Dedicated Hash Function; 2.2.4 Security Aspects of Message Authentication Codes; 2.2.5 Message Authentication Codes and Digital Signatures; 2.3 Channel Coding; 2.3.1 Reed-Solomon Codes; 2.3.2 Convolutional and Turbo Codes; 2.3.3 Soft Input Soft Output Decoding; 2.3.4 Concatenated Codes; 2.4 Joint Source and Channel Coding; 3 Related Work; 3.1 Channel Coding with Bit Inversion. 3.2 Error tolerant Cryptographic Checksums3.3 Authentication over Noisy Channels; 4 Soft Input Hard Verification; 4.1 Correction by Iterative Bit Inversion; 4.2 Security Aspects of Soft Input Hard Verification; 4.3 Correction Improvement by Interleaving and Feedback; 4.4 Correction by Insertion of Known Bits; 5 Applications of Soft Input Bit Inversion; 5.1 Correction of Reed-Solomon Decoding Errors; 5.2 HARQ IBF Algorithm; 5.3 N-Channel STOP and WAIT Protocol of WiMAX; 5.4 Enhanced Packet Combining over HYBRID-ARQ; 5.5 Error Correcting and Weighted Noise Tolerant Message Authentication Codes. 6 Soft Verification of the Message Authentication Codes6.1 Soft Verification versus Hard Verification; 6.2 Soft Input Soft Verification; 6.3 Calculation of the Threshold; 6.3.1 Probability Distribution Function of the Hamming Distance; 6.3.2 Analysis of the Hamming Distance and the Threshold; 6.3.3 Simulative Specification of the Threshold; 6.4 Verification Gain; 7 Security Aspects of Soft Input Soft Verification; 7.1 Forgery Attacks; 7.1.1 Birthday Paradox for Near Collisions; 7.1.2 Compensation of the Reduced Complexity of a Forgery Attack; 7.2 Wrong Decisions. 7.2.1 Probability of a Wrong Decision7.2.2 Compensation of the Increased Probability of Wrong Decision; 7.3 Total Compensation; 7.4 Selection of the Algorithmic Parameters; 8 Soft Output of Soft Input Soft Verification; 9 Applications of Soft Input Soft Verification; 10 Summary and Future Work; Epilogue; Works Cited; List of Abbreviations. Coding theory. http://id.loc.gov/authorities/subjects/sh85027654 Cryptography. Cryptographie. TECHNOLOGY & ENGINEERING Mechanical. bisacsh Coding theory fast Cryptography fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85027654 |
title | Coding and cryptography : synergy for a robust communication / |
title_auth | Coding and cryptography : synergy for a robust communication / |
title_exact_search | Coding and cryptography : synergy for a robust communication / |
title_full | Coding and cryptography : synergy for a robust communication / Dr.-Ing. habil. Nataša Živić, Universität Siegen. |
title_fullStr | Coding and cryptography : synergy for a robust communication / Dr.-Ing. habil. Nataša Živić, Universität Siegen. |
title_full_unstemmed | Coding and cryptography : synergy for a robust communication / Dr.-Ing. habil. Nataša Živić, Universität Siegen. |
title_short | Coding and cryptography : |
title_sort | coding and cryptography synergy for a robust communication |
title_sub | synergy for a robust communication / |
topic | Coding theory. http://id.loc.gov/authorities/subjects/sh85027654 Cryptography. Cryptographie. TECHNOLOGY & ENGINEERING Mechanical. bisacsh Coding theory fast Cryptography fast |
topic_facet | Coding theory. Cryptography. Cryptographie. TECHNOLOGY & ENGINEERING Mechanical. Coding theory Cryptography |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=674485 |
work_keys_str_mv | AT zivicnatasa codingandcryptographysynergyforarobustcommunication |