Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes

Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes PDF Author: B. Preneel
Publisher: IOS Press
ISBN: 160750426X
Category : Computers
Languages : en
Pages : 284

Get Book Here

Book Description
The NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes has been organized in Veliko Tarnovo, Bulgaria, on October 6-9, 2008 by the Institute of Mathematics and Informatics of the Bulgarian Academy of Sciences in cooperation with COSIC, KU Leuven and in the framework of the NATO Science for Peace and Security program. Goal of the organizers was to gather international experts from both fields - coding theory and cryptography - in order to exchange ideas, define new challenges and open problems for future research. These proceedings present the state-of-the-art in the current research on cryptography applying techniques and results from coding theory. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes is divided into two parts. In the first part the papers based on the lectures of the invited speakers, and in the second part the papers based on the talks of the participants in the workshop are included.

Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes

Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes PDF Author: B. Preneel
Publisher: IOS Press
ISBN: 160750426X
Category : Computers
Languages : en
Pages : 284

Get Book Here

Book Description
The NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes has been organized in Veliko Tarnovo, Bulgaria, on October 6-9, 2008 by the Institute of Mathematics and Informatics of the Bulgarian Academy of Sciences in cooperation with COSIC, KU Leuven and in the framework of the NATO Science for Peace and Security program. Goal of the organizers was to gather international experts from both fields - coding theory and cryptography - in order to exchange ideas, define new challenges and open problems for future research. These proceedings present the state-of-the-art in the current research on cryptography applying techniques and results from coding theory. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes is divided into two parts. In the first part the papers based on the lectures of the invited speakers, and in the second part the papers based on the talks of the participants in the workshop are included.

Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes

Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes PDF Author: Bart Preneel
Publisher: IOS Press
ISBN: 1607500027
Category : Computers
Languages : en
Pages : 284

Get Book Here

Book Description
The NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes has been organized in Veliko Tarnovo, Bulgaria, on October 6-9, 2008. This title includes the papers based on the lectures of the invited speakers, and on the talks of the participants in the workshop.

Boolean Functions for Cryptography and Coding Theory

Boolean Functions for Cryptography and Coding Theory PDF Author: Claude Carlet
Publisher: Cambridge University Press
ISBN: 1108473806
Category : Computers
Languages : en
Pages : 577

Get Book Here

Book Description
A complete, accessible book on single and multiple output Boolean functions in cryptography and coding, with recent applications and problems.

Mathematical Aspects of Computer and Information Sciences

Mathematical Aspects of Computer and Information Sciences PDF Author: Daniel Slamanig
Publisher: Springer Nature
ISBN: 3030431207
Category : Computers
Languages : en
Pages : 469

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 8th International Conference on Mathematical Aspects of Computer and Information Sciences, MACIS 2019, held in Gebze, Turkey, in November 2019. The 22 revised papers and 14 short papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in the following topical sections: algorithms and foundation; security and cryptography; combinatorics, codes, designs and graphs; data modeling and machine learning; tools and software track.

Finite Fields and Their Applications

Finite Fields and Their Applications PDF Author: Pascale Charpin
Publisher: Walter de Gruyter
ISBN: 3110283603
Category : Mathematics
Languages : en
Pages : 288

Get Book Here

Book Description
This book is based on the invited talks of the "RICAM-Workshop on Finite Fields and Their Applications: Character Sums and Polynomials" held at the Federal Institute for Adult Education (BIfEB) in Strobl, Austria, from September 2-7, 2012. Finite fields play important roles in many application areas such as coding theory, cryptography, Monte Carlo and quasi-Monte Carlo methods, pseudorandom number generation, quantum computing, and wireless communication. In this book we will focus on sequences, character sums, and polynomials over finite fields in view of the above mentioned application areas: Chapters 1 and 2 deal with sequences mainly constructed via characters and analyzed using bounds on character sums. Chapters 3, 5, and 6 deal with polynomials over finite fields. Chapters 4 and 9 consider problems related to coding theory studied via finite geometry and additive combinatorics, respectively. Chapter 7 deals with quasirandom points in view of applications to numerical integration using quasi-Monte Carlo methods and simulation. Chapter 8 studies aspects of iterations of rational functions from which pseudorandom numbers for Monte Carlo methods can be derived. The goal of this book is giving an overview of several recent research directions as well as stimulating research in sequences and polynomials under the unified framework of character theory.

Security of Ubiquitous Computing Systems

Security of Ubiquitous Computing Systems PDF Author: Gildas Avoine
Publisher: Springer Nature
ISBN: 3030105911
Category : Computers
Languages : en
Pages : 268

Get Book Here

Book Description
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.

Advances in Cryptology -- ASIACRYPT 2012

Advances in Cryptology -- ASIACRYPT 2012 PDF Author: Xiaoyun Wang
Publisher: Springer Science & Business Media
ISBN: 3642349617
Category : Computers
Languages : en
Pages : 791

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.

Arithmetic of Finite Fields

Arithmetic of Finite Fields PDF Author: Jean Claude Bajard
Publisher: Springer Nature
ISBN: 3030688690
Category : Computers
Languages : en
Pages : 273

Get Book Here

Book Description
This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2020, held in Rennes, France in July 2020. Due to the COVID-19, the workshop was held online. The 12 revised full papers and 3 invited talks presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on invited talks, Finite Field Arithmetic, Coding Theory, Network Security and much more.

Research in Computer Science in the Bulgarian Academy of Sciences

Research in Computer Science in the Bulgarian Academy of Sciences PDF Author: Krassimir T. Atanassov
Publisher: Springer Nature
ISBN: 3030722848
Category : Technology & Engineering
Languages : en
Pages : 501

Get Book Here

Book Description
This book is a collection of papers devoted to the emergence and development in Bulgarian Academy of Sciences of some of the areas of informatics, including artificial intelligence. The papers are prepared by specialists from the Academy, some of whom are among the founders of these scientific and application areas in Bulgaria and in some cases – in the world. The book is interesting for specialists in informatics and computer science and researchers in history of sciences.

Cryptography and Coding

Cryptography and Coding PDF Author: Matthew G. Parker
Publisher: Springer Science & Business Media
ISBN: 3642108679
Category : Computers
Languages : en
Pages : 505

Get Book Here

Book Description
The12thintheseriesofIMAConferencesonCryptographyandCodingwasheld at the Royal Agricultural College, Cirencester, December 15–17, 2009. The p- gram comprised 3 invited talks and 26 contributed talks. The contributed talks werechosenbyathoroughreviewingprocessfrom53submissions.Oftheinvited and contributed talks,28 arerepresentedaspapersin this volume. These papers are grouped loosely under the headings: Coding Theory, Symmetric Crypt- raphy, Security Protocols, Asymmetric Cryptography, Boolean Functions, and Side Channels and Implementations. Numerous people helped to make this conference a success. To begin with I would like to thank all members of the Technical Program Committee who put a great deal of e?ort into the reviewing process so as to ensure a hi- quality program. Moreover, I wish to thank a number of people, external to the committee, who also contributed reviews on the submitted papers. Thanks, of course,mustalso goto allauthorswho submitted papers to the conference,both those rejected and accepted. The review process was also greatly facilitated by the use of the Web-submission-and-review software, written by Shai Halevi of IBM Research, and I would like to thank him for making this package available to the community. The invited talks were given by Frank Kschischang, Ronald Cramer, and Alexander Pott, and two of these invitedtalksappearaspapersinthisvolume. A particular thanks goes to these invited speakers, each of whom is well-known, notonlyforbeingaworld-leaderintheir?eld,butalsofortheirparticularability to communicate their expertise in an enjoyable and stimulating manner.