Read While You Wait - Get immediate ebook access, if available*, when you order a print book

Lecture Notes in Computer Science

Cryptography and Coding

8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings

Editors: Honary, Bahram (Ed.)

Free Preview

Buy this book

eBook $84.99
price for USA in USD (gross)
  • ISBN 978-3-540-45325-3
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $109.00
price for USA in USD
  • ISBN 978-3-540-43026-1
  • Free shipping for individuals worldwide
  • Immediate ebook access, if available*, with your print order
  • Usually dispatched within 3 to 5 business days.
About this book

The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of “Cryptography and Coding” was both timely and relevant. The theme of this conference was the future of coding and cryptography, which was touched upon in presentations by a number of invited speakers and researchers. The papers that appear in this book include recent research and development in error control coding and cryptography. These start with mathematical bounds, statistical decoding schemes for error correcting codes, and undetected error probabilities and continue with the theoretical aspects of error correction coding such as graph and trellis decoding, multifunctional and multiple access communication systems, low density parity check codes, and iterative decoding. These are followed by some papers on key recovery attack, authentication, stream cipher design, and analysis of ECIES algorithms, and lattice attacks on IP based protocols.

Table of contents (38 chapters)

Table of contents (38 chapters)
  • A Statistical Decoding Algorithm for General Linear Block Codes

    Pages 1-8

    Jabri, A. Al

  • On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory

    Pages 9-19

    Lange, Christoph (et al.)

  • The Complete Weight Enumerator for Codes over M nxs(F q)

    Pages 20-26

    Siap, Irfan

  • Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem

    Pages 27-37

    Yoshida, Maki (et al.)

  • A Simple Soft-Input/Soft-Output Decoder for Hamming Codes

    Pages 38-43

    Hirst, Simon (et al.)

Buy this book

eBook $84.99
price for USA in USD (gross)
  • ISBN 978-3-540-45325-3
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $109.00
price for USA in USD
  • ISBN 978-3-540-43026-1
  • Free shipping for individuals worldwide
  • Immediate ebook access, if available*, with your print order
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Cryptography and Coding
Book Subtitle
8th IMA International Conference Cirencester, UK, December 17-19, 2001 Proceedings
Editors
  • Bahram Honary
Series Title
Lecture Notes in Computer Science
Series Volume
2260
Copyright
2001
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-45325-3
DOI
10.1007/3-540-45325-3
Softcover ISBN
978-3-540-43026-1
Series ISSN
0302-9743
Edition Number
1
Number of Pages
IX, 419
Topics

*immediately available upon purchase as print book shipments may be delayed due to the COVID-19 crisis. ebook access is temporary and does not include ownership of the ebook. Only valid for books with an ebook version. Springer Reference Works are not included.