Claude Carlet, Keqin Feng (auth.), Yeow Meng Chee, Chao Li,'s Coding and Cryptology: Second International Workshop, IWCC PDF

By Claude Carlet, Keqin Feng (auth.), Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing (eds.)

ISBN-10: 3642018130

ISBN-13: 9783642018138

This booklet constitutes the refereed complaints of the second one foreign Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009.

The 21 revised complete technical papers, other than one, are contributed by means of the invited audio system of the workshop. The papers have been conscientiously chosen in the course of rounds of reviewing and development for inclusion within the quantity and handle all facets of coding concept, cryptology and similar components - resembling combinatorics - theoretical or utilized. themes addressed are coding idea, safe codes, hash capabilities, combinatorics, boolean features, authentication, cryptography, protocols, sequences, and safe communications.

Show description

Read Online or Download Coding and Cryptology: Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings PDF

Best international conferences and symposiums books

Spatial Information Theory A Theoretical Basis for GIS: by Wolfgang Maaß (auth.), Andrew U. Frank, Irene Campari (eds.) PDF

This quantity collects the papers offered on the eu convention on Spatial info thought (COSIT '93) hung on the island of Elba, Italy, inSeptember 1993. Spatial details conception comprises disciplinary subject matters and interdisciplinary concerns facing the conceptualization and formalization of large-scale (geographic) house.

Download e-book for kindle: Security and Privacy in Digital Rights Management: ACM CCS-8 by Markus Jakobsson, Michael K. Reiter (auth.), Tomas Sander

The ACM Workshop on safety and privateness in electronic Rights administration is the ? rst scienti? c workshop with refereed lawsuits dedicated completely to this subject. The workshop was once held along side the 8th ACM convention on desktop and Communications safeguard (CCS-8) in Philadelphia, united states on November five, 2001.

FSTTCS 2006: Foundations of Software Technology and - download pdf or read online

This e-book constitutes the refereed court cases of the twenty sixth foreign convention at the Foundations of software program expertise and Theoretical laptop technology, FSTTCS 2006, held in Kolkata, India, in December 2006. The 34 revised complete papers offered including four invited papers have been rigorously reviewed and chosen from one hundred fifty five submissions.

Get Universal Acess in Human Computer Interaction. Coping with PDF

The twelfth overseas convention on Human-Computer interplay, HCI Inter- tional 2007, was once held in Beijing, P. R. China, 22-27 July 2007, together with the S- posium on Human Interface (Japan) 2007, the seventh foreign convention on Engineering Psychology and Cognitive Ergonomics, the 4th foreign convention on common entry in Human-Computer interplay, the 2d overseas Conf- ence on digital truth, the 2d foreign convention on Usability and Inter- tionalization, the second foreign convention on on-line groups and Social Computing, the third overseas convention on Augmented Cognition, and the first foreign convention on electronic Human Modeling.

Additional resources for Coding and Cryptology: Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings

Example text

In this case, our main estimate (13) is replaced with an estimate 50 I. Dumer max Pr(g, h) nλ npt n−nλ n(1−p)t n npt n−npt n(1−p)t where θ (λ, t) = 1 t H(λ) − qH 2−ntθ(λ,t) λ − pt q It can be shown that for any λ ∈ (p, q ), the quantity θ (λ, t) exceeds the former code rate θ (p, t) obtained in (10). Therefore, Theorems 1 and 2 still hold for our equal-weight codes of weight pn if the forged fingerprints y have varying Hamming weights in the interval [pn, q n]. We also note the remark of G. Tardos who pointed to a different setting that can be related to the cover-free sets [12].

J. Colbourn and G. K´eri clear. The extent of the improvements is perhaps surprising; while it indicates in part the limitations of existing methods, it also suggests that the study of covering arrays obtained by translation is a useful one. 3 Quadratic Residues In order to apply Lemmas 1, 2, and 3, one needs to find vectors that meet the conditions specified. However, for larger t and hence larger k, the number of candidate vectors to consider is too large for practical computation. Therefore we examine a specific construction.

HKUST 612405. References 1. : Weights of irreducible cyclic codes. Information and Control 20, 158–175 (1972) 2. : Weight distributions of some irreducible cyclic codes. DSN Progress Report 16, 128–131 (1973) 3. : Three-weight codes and association schemes. Philips J. Res. 39, 143–152 (1984) 4. : Minimum weight and dimension formulas for some geometric codes. Designs, Codes and Cryptography 17, 105–120 (1999) 5. : Irreducible binary cyclic codes of even dimension. In: Proc. Second Chapel Hill Conf.

Download PDF sample

Coding and Cryptology: Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings by Claude Carlet, Keqin Feng (auth.), Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing (eds.)


by Kevin
4.4

Rated 4.05 of 5 – based on 12 votes