Skip to main content
  • Conference proceedings
  • © 1994

Error Control, Cryptology, and Speech Compression

Workshop on Information Protection, Moscow, Russia, December 6 - 9, 1993. Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 829)

Conference series link(s): ECCSP: Workshop on Information Protection

Conference proceedings info: ECCSP 1993.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 papers)

  1. Front Matter

  2. Algebraic aspects of key generation systems

    • V. A. Artamonov, A. A. Klyachko, V. M. Sidelnikov, V. V. Yashchenko
    Pages 1-5
  3. How to avoid the Sidel'nikov-Shestakov attack

    • Ernst M. Gabidulin, Olaf Kjelsen
    Pages 25-32
  4. Linear algebra approach to secret sharing schemes

    • G. R. Blakley, G. A. Kabatianskii
    Pages 33-40
  5. Generalizations of the Griesmer bound

    • Tor Helleseth, Torleiv Kløve, Øyvind Ytrehus
    Pages 41-52
  6. Codes that correct two-dimensional burst errors

    • Ernst M. Gabidulin, Vitaly V. Zanin
    Pages 53-62
  7. Partial unit memory codes on the base of subcodes of Hadamard codes

    • V. V. Zyablov, A. E. Ashikhmin
    Pages 69-73
  8. Concatenated codes with convolutional inner and outer codes

    • Uwe Dettmar, Ulrich K. Sorger, Victor. V. Zyablov
    Pages 80-87
  9. Tables of coverings for decoding by S-sets

    • I. L. Asnis, S. V. Fedorenko, E. A. Krouk, E. T. Mironchikov
    Pages 97-102
  10. Periodicity of one-dimensional tilings

    • V. Sidorenko
    Pages 103-108
  11. Fast infinite response filtering for speech processing

    • Irina E. Bocharova, Boris D. Kudryashov
    Pages 109-114
  12. On trellis codes for linear predictive speech compression

    • Irina E. Bocharova, Victor D. Kolesnik, Victor Yu. Krachkovsky, Boris D. Kudryashov, Eugeny P. Ovsjannikov, Boris K. Troyanovsky
    Pages 115-121
  13. Back Matter

Other Volumes

  1. Error Control, Cryptology, and Speech Compression

About this book

This volume comprises a collection of papers presented at the Workshop on Information Protection, held in Moscow, Russia in December 1993. The 16 thoroughly refereed papers by internationally known scientists selected for this volume offer an exciting perspective on error control coding, cryptology, and speech compression. In the former Soviet Union, research related to information protection was often shielded from the international scientific community. Therefore, the results presented by Russian researchers and engineers at this first international workshop on this topic are of particular interest; their work defines the cutting edge of research in many areas of error control, cryptology, and speech recognition.

Bibliographic Information

  • Book Title: Error Control, Cryptology, and Speech Compression

  • Book Subtitle: Workshop on Information Protection, Moscow, Russia, December 6 - 9, 1993. Selected Papers

  • Editors: Andrew Chmora, Stephen B. Wicker

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/3-540-58265-7

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Springer Book Archive

  • Copyright Information: Springer-Verlag Berlin Heidelberg 1994

  • Softcover ISBN: 978-3-540-58265-6Published: 28 July 1994

  • eBook ISBN: 978-3-540-48588-9Published: 07 July 2005

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: IX, 127

  • Topics: Cryptology, Signal, Image and Speech Processing, Coding and Information Theory

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access