
Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1025)
Included in the following conference series:
Conference proceedings info: Cryptography and Coding 1995.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The volume presents 22 full revised papers selected from 48 submissions together with five invited full papers and three abstracts on the mathematical theory and practice of cryptography and coding; continuing advances in these strongly related areas are crucial for the security and reliability of data communication, processing, and storage. Among the topics addressed are linear codes, error-correcting codes, decoding, key distribution, authentication, hash functions, block ciphers, cryptanalysis, and electronic cash.
Similar content being viewed by others
Keywords
Table of contents (30 papers)
Other volumes
-
Cryptography and Coding
Bibliographic Information
Book Title: Cryptography and Coding
Book Subtitle: Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings
Editors: Colin Boyd
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/3-540-60693-9
Publisher: Springer Berlin, Heidelberg
-
eBook Packages: Springer Book Archive
Copyright Information: Springer-Verlag Berlin Heidelberg 1995
Softcover ISBN: 978-3-540-60693-2Published: 06 December 1995
eBook ISBN: 978-3-540-49280-1Published: 15 July 2005
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XI, 297
Topics: Theory of Computation, Cryptology, Coding and Information Theory, Combinatorics, Computer Communication Networks, IT in Business