Cryptography and Coding
Editat de Michael Darnellen Limba Engleză Paperback – 3 dec 1997
Preț: 323.83 lei
Preț vechi: 404.79 lei
-20% Nou
Puncte Express: 486
Preț estimativ în valută:
57.30€ • 67.19$ • 50.32£
57.30€ • 67.19$ • 50.32£
Carte tipărită la comandă
Livrare economică 30 ianuarie-13 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540639275
ISBN-10: 3540639276
Pagini: 352
Ilustrații: XI, 345 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.53 kg
Ediția:1997
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540639276
Pagini: 352
Ilustrații: XI, 345 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.53 kg
Ediția:1997
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
The theory and application of reciprocal pairs of periodic sequences.- Zero-error codes for correlated information sources.- Trellis decoding techniques and their performance in the adder channel for synchronous and asynchronous CCMA codes.- Key agreement protocols and their security analysis.- Low density parity check codes based on sparse matrices with no small cycles.- On the SAFER cryptosystem.- An adaptive approach to T of N user multi-access communications channel using an orthogonal coded multiplexer.- The breaking of the Lorenz Cipher: An introduction to the theory behind the operational role of “Colossus” at BP.- Split knowledge generation of RSA parameters.- Analysis of error control in digital trunked radio systems.- Reconstruction of convolutional encoders over GF(q).- HCC: A hash function using error correcting codes.- Public-key cryptosystems based on elliptic curves.- Novel application of turbo decoding for radio channels.- Finding small roots of univariate modular equations revisited.- Robust Reed Solomon coded MPSK modulation.- RSA-type signatures in the presence of transient faults.- A digital signature scheme based on random error-correcting codes.- Variable rate adaptive trellis coded QAM for high bandwidth efficiency applications under Rayleigh fading channel.- Variable rate adaptive channel coding for coherent and non-coherent rayleigh fading channel.- Labyrinth: A new ultra high speed stream cipher.- Resisting the Bergen-Hogan attack on adaptive arithmetic coding.- Novel decoding technique for the synchronous and quasi-synchronous multiple access adder channel.- Increasing efficiency of International key escrow in mutually mistrusting domains.- Multi dimensional compartment schemes.- Evaluation of standard approximation to log-likelihood ratioaddition in the MAP algorithm, and Its application in block code (‘Turbo’) Iterative decoding algorithms.- Multiuser coding based on detecting matrices for Synchronous-CDMA systems.- Enumeration of convolutional codes and minimal encoders.- On using Carmichael numbers for public key encryption systems.- Hash functions and MAC algorithms based on block ciphers.- Witness hiding restrictive blind signature scheme.- A note on the construction and upper bounds of correlation-immune functions.- On generalised concatenated codes.- Error performance analysis of different interleaving strategies applied to eight track digital tape systems.- Efficient error-propagating block chaining.