Coding And Cryptology - Proceedings Of The First International Workshop

Coding And Cryptology - Proceedings Of The First International Workshop
Categories: Ebooks
140.4 GBP
Buy Now

Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online commercial activities, business transactions and government services over open computer and communication networks. However, such developments are only possible if communications can be conducted in a secure and reliable manner. The mathematical theory and practice of coding theory and cryptology underpin the provision of effective security and reliability for data communication, processing and storage. Theoretical and practical advances in these fields are therefore a key factor in facilitating the growth of data communications and data networks.The aim of the International Workshop on Coding and Cryptology 2007 was to bring together experts from coding theory, cryptology and their related areas for a fruitful exchange of ideas in order to stimulate further research and collaboration among mathematicians, computer scientists, practical cryptographers and engineers. This post-proceedings of the workshop consists of 20 selected papers on a wide range of topics in coding theory and cryptology, including theory, techniques, applications, and practical experiences. They cover significant advances in these areas and contain very useful surveys.Contents:Fuzzy Identity-based Encryption: New and Efficient Schemes (J Baek et al.)A Method of Construction of Balanced Functions with Optimum Algebraic Immunity (C Carlet)A Critical Look at Cryptographic Hash Function Literature (S Contini et al.)An Improved Distinguisher for Dragon (J Y Cho & J Pieprzyk)Constructing Perfect Hash Families Using a Greedy Algorithm (C J Colbourn)On the Relation Among Various Security Models for Certificateless Cryptography (Q Huang & D S Wong)Distance-Preserving Mappings (T Kløve)Single-Cycle Invertible Function and Its Cryptographic Applications (C Li et al.)Authentication Codes in the Query Model (R Safavi-Naini et al.)Collision in the DSA Function (I E Shparlinski & R Steinfeld)The Successive Minima Profile of Multisequences (L Wang & H Niederreiter)A Construction of Optimal Sets of FH Sequences (J Yin)and other papersReadership: Researchers in coding theory and cryptology, computer scientists and engineers.