Claude Carlet, Keqin Feng (auth.), Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing (eds.)9783642018138, 3642018130
This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009.
The 21 revised full technical papers, except one, are contributed by the invited speakers of the workshop. The papers were carefully selected during two rounds of reviewing and improvement for inclusion in the volume and address all aspects of coding theory, cryptology and related areas – such as combinatorics – theoretical or applied. Topics addressed are coding theory, secure codes, hash functions, combinatorics, boolean functions, authentication, cryptography, protocols, sequences, and secure communications.
Table of contents :
Front Matter….Pages –
An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity….Pages 1-11
Separation and Witnesses….Pages 12-21
Binary Covering Arrays and Existentially Closed Graphs….Pages 22-33
A Class of Three-Weight and Four-Weight Codes….Pages 34-42
Equal-Weight Fingerprinting Codes….Pages 43-51
Problems on Two-Dimensional Synchronization Patterns….Pages 52-62
A New Client-to-Client Password-Authenticated Key Agreement Protocol….Pages 63-76
Elliptic Twin Prime Conjecture….Pages 77-81
Hunting for Curves with Many Points….Pages 82-96
List Decoding of Binary Codes–A Brief Survey of Some Recent Results….Pages 97-106
Recent Developments in Low-Density Parity-Check Codes….Pages 107-123
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks….Pages 124-145
On Weierstrass Semigroups of Some Triples on Norm-Trace Curves….Pages 146-156
ERINDALE: A Polynomial Based Hashing Algorithm….Pages 157-170
A Survey of Algebraic Unitary Codes….Pages 171-187
New Family of Non-Cartesian Perfect Authentication Codes….Pages 188-201
On the Impossibility of Strong Encryption Over $aleph_0$ ….Pages 202-218
Minimum Distance between Bent and Resilient Boolean Functions….Pages 219-232
Unconditionally Secure Approximate Message Authentication….Pages 233-247
Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences….Pages 248-258
On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction….Pages 259-273
Back Matter….Pages –
Reviews
There are no reviews yet.