Coding and Cryptography International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected Papers / edited by Øyvind Ytrehus.

Thisvolumecontainsrefereedpapersdevotedtocodingandcryptography.These papers arethe full versionsof a selectionof the best extended abstractsaccepted for presentation at the International Workshop on Coding and Cryptography (WCC 2005) held in Bergen, Norway, March 14–18, 2005. Each of the 118 - tende...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Ytrehus, Øyvind (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edition:1st ed. 2006.
Series:Security and Cryptology ; 3969
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Second Support Weights for Binary Self-dual Codes
  • On Codes Correcting Symmetric Rank Errors
  • Error and Erasure Correction of Interleaved Reed–Solomon Codes
  • A Welch–Berlekamp Like Algorithm for Decoding Gabidulin Codes
  • On the Weights of Binary Irreducible Cyclic Codes
  • 3-Designs from Z 4-Goethals-Like Codes and Variants of Cyclotomic Polynomials
  • Space-Time Code Designs Based on the Generalized Binary Rank Criterion with Applications to Cooperative Diversity
  • Geometric Conditions for the Extendability of Ternary Linear Codes
  • On the Design of Codes for DNA Computing
  • Open Problems Related to Algebraic Attacks on Stream Ciphers
  • On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two
  • Interpolation of Functions Related to the Integer Factoring Problem
  • On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography
  • Finding Good Differential Patterns for Attacks on SHA-1
  • Extending Gibson’s Attacks on the GPT Cryptosystem
  • Reduction of Conjugacy Problem in Braid Groups, Using Two Garside Structures
  • A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy
  • Multi-Dimensional Hash Chains and Application to Micropayment Schemes
  • On the Affine Transformations of HFE-Cryptosystems and Systems with Branches
  • Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
  • RSA-Based Secret Handshakes
  • On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes
  • ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps
  • A New Public-Key Cryptosystem Based on the Problem of Reconstructing p–Polynomials
  • On the Wagner–Magyarik Cryptosystem
  • Constructions of Complementary Sequences for Power-Controlled OFDM Transmission
  • A Novel Method for Constructing Almost Perfect Polyphase Sequences
  • Linear Filtering of Nonlinear Shift-Register Sequences
  • Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation
  • Frequency/Time Hopping Sequences with Large Linear Complexities
  • One and Two-Variable Interlace Polynomials: A Spectral Interpretation
  • Improved Bounds on Weil Sums over Galois Rings and Homogeneous Weights
  • Locally Invertible Multivariate Polynomial Matrices.