Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 16th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-16, held in Las Vegas, NV, USA in February 2006.

The 25 revised full papers presented together with 7 invited papers were carefully reviewed and selected from 32 submissions. Among the subjects addressed are block codes; algebra and codes: rings, fields, and AG codes; cryptography; sequences; decoding algorithms; and algebra: constructions in algebra, Galois groups, differential algebra, and polynomials.

Author(s): Claude Carlet (auth.), Marc P. C. Fossorier, Hideki Imai, Shu Lin, Alain Poli (eds.)
Series: Lecture Notes in Computer Science 3857 : Theoretical Computer Science and General Issues
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 344
Tags: Coding and Information Theory; Data Encryption; Discrete Mathematics in Computer Science; Algorithm Analysis and Problem Complexity; Symbolic and Algebraic Manipulation; Algorithms

Front Matter....Pages -
On Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities....Pages 1-28
On Generalized Parity Checks....Pages 29-34
Cryptography Based on Bilinear Maps....Pages 35-50
The Merit Factor Problem for Binary Sequences....Pages 51-59
Quantum Period Reconstruction of Binary Sequences....Pages 60-67
The Vector Key Equation and Multisequence Shift Register Synthesis....Pages 68-75
A General Framework for Applying FGLM Techniques to Linear Codes....Pages 76-86
A Theory of Highly Nonlinear Functions....Pages 87-100
The Solutions of the Third Power Sum Equation for Niho Type Decimations....Pages 101-107
On Constructing AG Codes Without Basis Functions for Riemann-Roch Spaces....Pages 108-117
Computing Gröbner Bases for Vanishing Ideals of Finite Sets of Points....Pages 118-127
A Class of Fermat Curves for which Weil-Serre’s Bound Can Be Improved....Pages 128-135
Nonbinary Quantum Codes from Hermitian Curves....Pages 136-143
A Genetic Algorithm for Cocyclic Hadamard Matrices....Pages 144-153
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication....Pages 154-162
A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI....Pages 163-172
On Achieving Chosen Ciphertext Security with Decryption Errors....Pages 173-182
Applying Fujisaki-Okamoto to Identity-Based Encryption....Pages 183-192
A Short Random Fingerprinting Code Against a Small Number of Pirates....Pages 193-202
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation....Pages 203-214
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs....Pages 215-224
New Bounds on the Capacity of Multi-dimensional RLL-Constrained Systems....Pages 225-234
LDPC Codes for Fading Channels: Two Strategies....Pages 235-244
Low-Floor Tanner Codes Via Hamming-Node or RSCC-Node Doping....Pages 245-254
Algebraic Constructions of Quasi-cyclic LDPC Codes – Part I: For AWGN and Binary Random Erasure Channels....Pages 255-264
Algebraic Construction of Quasi-cyclic LDPC Codes – Part II: For AWGN and Binary Random and Burst Erasure Channels....Pages 265-274
New Constructions of Quasi-cyclic LDPC Codes Based on Two Classes of Balanced Incomplete Block Designs: For AWGN and Binary Erasure Channels....Pages 275-284
Long Extended BCH Codes Are Spanned by Minimum Weight Words....Pages 285-294
On the Feng-Rao Bound for Generalized Hamming Weights....Pages 295-306
Nested Codes for Constrained Memory and for Dirty Paper....Pages 307-316
Complementary Sets and Reed-Muller Codes for Peak-to-Average Power Ratio Reduction in OFDM....Pages 317-327
Hadamard Codes of Length 2 t s ( s Odd). Rank and Kernel....Pages 328-337
Back Matter....Pages -