Coding and Cryptology: Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009.

The 21 revised full technical papers, except one, are contributed by the invited speakers of the workshop. The papers were carefully selected during two rounds of reviewing and improvement for inclusion in the volume and address all aspects of coding theory, cryptology and related areas - such as combinatorics - theoretical or applied. Topics addressed are coding theory, secure codes, hash functions, combinatorics, boolean functions, authentication, cryptography, protocols, sequences, and secure communications.

Author(s): Claude Carlet, Keqin Feng (auth.), Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing (eds.)
Series: Lecture Notes in Computer Science 5557 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 275
City: Oxford
Tags: Coding and Information Theory; Data Encryption; Discrete Mathematics in Computer Science; Computer Communication Networks

Front Matter....Pages -
An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity....Pages 1-11
Separation and Witnesses....Pages 12-21
Binary Covering Arrays and Existentially Closed Graphs....Pages 22-33
A Class of Three-Weight and Four-Weight Codes....Pages 34-42
Equal-Weight Fingerprinting Codes....Pages 43-51
Problems on Two-Dimensional Synchronization Patterns....Pages 52-62
A New Client-to-Client Password-Authenticated Key Agreement Protocol....Pages 63-76
Elliptic Twin Prime Conjecture....Pages 77-81
Hunting for Curves with Many Points....Pages 82-96
List Decoding of Binary Codes–A Brief Survey of Some Recent Results....Pages 97-106
Recent Developments in Low-Density Parity-Check Codes....Pages 107-123
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks....Pages 124-145
On Weierstrass Semigroups of Some Triples on Norm-Trace Curves....Pages 146-156
ERINDALE: A Polynomial Based Hashing Algorithm....Pages 157-170
A Survey of Algebraic Unitary Codes....Pages 171-187
New Family of Non-Cartesian Perfect Authentication Codes....Pages 188-201
On the Impossibility of Strong Encryption Over $\aleph_0$ ....Pages 202-218
Minimum Distance between Bent and Resilient Boolean Functions....Pages 219-232
Unconditionally Secure Approximate Message Authentication....Pages 233-247
Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences....Pages 248-258
On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction....Pages 259-273
Back Matter....Pages -